Home
Centaur Refernece Manual
Contents
1. USED IN AFFECTS CROSS REFERENCE Site Programming Communications Schedule page 30 Global Anti Passback Reset Schedule page 34 Access Level Programming Card Programming page 92 Controller Programming Anti Passback Schedule page 60 Anti Passback Reset Schedule page 60 Door Programming Keypad Enabling Schedule page 73 Door Unlock Schedule page 73 REX Input Enabling Schedule page 76 Interlock Input Enabling Schedule page 77 Relay Programming Timed Activation Schedule page 111 Activating Schedule page 112 Input Programming Input Enabling Schedule page 121 Event Programming Event Display Schedule General tab page 135 Save to Disk Schedule General tab page 135 Device Activation Schedule General tab page 136 Acknowledge Schedule Alarms tab page 137 Sending E mail Schedule E Mail tab page 139 Sending ASCII Command Schedule CCTV Control tab page 140 Elevator Control Floor Group Enabling Schedule page 143 Programming Floor Schedules page 143 Please note that Centaur includes two default schedules Always and Never which cannot be modified or deleted The Always schedule is valid 24 hours a day 365 days per year including any programmed Holidays The Never schedule is invalid at all times Adding a Schedule In order to add a schedule at least one site must be created If you have not created a site please refer to Sites on page 23 To add a schedule right click Schedules in th
2. Keypad time out Jooo Wrong code on keypad ooo Door open Jooo Door forced open 44333 29333 ela oj 5 All times are in milliseconds Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Outputs Adding Outputs In order to add one or more outputs at least one site and one controller must be created If you have not created a site please refer to Sites on page 23 For more information on setting up a controller refer to Controllers on page 49 When adding outputs using the methods described in the following sections you will be required to select an address for each output These addresses represent a specific output on the selected controller as described in Figure 31 If you wish to add one output or multiple outputs at one time right click Outputs from the desired controller in the Database Tree View window From the drop down list select New Outputs You can also click the desired output and press the keyboard Insert key Select the desired output address es and click OK After adding the output s you will have to configure them within the Output Properties window see Modifying an Output Modifying an Output From the desired controller branch in the Database Tree View window right click the output you wish to modify click Properties from the drop down list You can also click the desired output and press the keyboard Enter key General
3. Manufacturing Access Control Since 1985 N REFERENCE MANUAL Figure 10 Controller s Door Configuration CT V900 A Partial View Controller Properties Y x Controler Configuration Antipassback Expander Door 1 Reader Standard 26 Bit Keypad None Door 2 Reader Standard 26 Ba Keypad None Input configuration g CAZA 16lnputs ATZ 3R 16 Inputs Communication IPAddes 0 0 0 Reader and or keypad for Door 1 Port Number 000 Pol Timeout 000 me Active 7 Controller time out 05000 ms LogCom Fale I coe Conor response delay 000 m Fast Event Request I Reader Type From the Reader drop down list select the type of reader used If no reader is being used on the selected door select None Keypad Type From the Keypad drop down list select the type of keypad used If the controller s door is not using a keypad select None When both a reader and a keypad are used only card holders with the Use Keypad option enabled see Use Keypad on page 93 have to use both to gain access Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Controllers Setting the Controller Input Configuration Each controller has eight inputs that can be doubled to 16 and each 2 Door Expansion Module CA A470 A has four inputs This means that the controller can monitor the state of up to 28 input devices These inputs can be used to monitor de
4. The Component Services window will appear Expand the Component Services Computers and MyComputer branches and click DCOM Config Se File Action View Window Help e Amx r Ae 0 t Console Root E e Component Services EY Computers 8 my Sopa 09 AccStore Class Acrobat Y COM Applications WebCapture DCOM Config m Y Distributed Transaction Coordinator W Running Processes amp amp E Event Viewer Local AcroDistX AcroExch P E Services Local ss Adobe Document Acroba AcrobatWri Right click the SpxSvr file and click Properties File Action View Window Help gt AmaE e lt E Console Root B e Component Services E Computers 8 a My Computer m COM Applications 3 DCOM Config QQ Distributed Transaction Coordinator E 2 Running Processes E 2 Event Viewer Local SymiTCOM SymProtect E Services Local ee 32s b a n SEE 2E ot emes SSE gt SymUndo SyncMan SyncStatus 10 Systran50 SystranDMA Class ae Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration The SpxSvr Properties window will appear From the Authentication Level drop down list click None 21x General Location Security Endpoints Identity General properties of this DCOM application Application Name SpxSvr Application ID 2199D32 D198 11D2 A6F9 001054133541 Application Type
5. E DCOM Config serves Local E D Csr tated Transachon Cocerirator C Running Processes Evert Viewer Local i Services acn 3 Click the COM Applications branch The components of this branch will appear on the right side of your screen If you get an error message and or cannot access this branch of components you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 186 if not skip the next section and go directly to Setting the Firewall on page 189 Manufacturing Access Control Since 1985 5 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration Component Services Manufacturing Access Control Since 1985 Reparing DCOM Perform the following steps to repair your DCOM configuration 1 From the taskbar click Start gt Run The Run window will appear Enter cmd in the text box and click OK A 21x Type the name of a program folder document or a Internet resource and Windows will open it For you en cmd ip Cancel Browse 2 The CAWINDOWS System32 cmd exe window will appear Type cd systemroot system32 and press the keyboard Enter key Type msdtc uninstall and press the keyboard Enter key cx Select C WINDOWS system32 cmd exe M osoft Windows XP Version 5 1 2600 lt C gt Copyright 1985 2661 Microsoft Corp C Documents and Settings Technical Support gt cd systemrootz system32 C WINDOWS sy
6. Door Groups Input Groups Event Definitions Input Properties Action on page 136 Bypassing Inputs with an Input on page 121 Event Definitions Action on page 136 Activating Relays with an Input on page 123 Action on page 136 Relay Groups Input Properties Event Definitions Adding a Group In order to program a floor door input or relay group you must first program the site see Sites on page 23 and the schedules see Schedules on page 43 In the Database Tree View window expand the Groups folder from the desired Site branch right click the desired type of group Door Groups Floor Groups Input Groups or Relay Groups and select New Group from the drop down list You can also select the desired group and press the keyboard Insert key The appropriate Properties window will appear see Modifying a Group on page 143 Floor Group Properties Floor Group Floors Site 2 Floor Group 1 Floor Group 001 gt Name Notes Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Groups e S Modifying a Group From the desired Site branch in the Database Tree View window expand the Groups folder expand the desired group folder Door Groups Floor Groups Input Groups or Relay Groups right click the desired group you wish to modify and click Properties from the drop down list You can also select the desired
7. Unlock Time on page 74 Also refer to Selecting the Lock Control Type on page 73 Assigning a REX Input Request for Exit A request for exit REX input is required if you have selected the Access controlled entry configuration see Selecting a Door Type on page 71 If you do not use a REX input the controller will not be able to distinguish between a valid exit and a forced exit The controller will always generate a Door Forced event Perform the following to set up a REX input 1 A vertical motion detector must be installed above the door and it must be connected to an input on the controller refer to the appropriate controller s Installation Manual 2 The input must be programmed as detailed in Inputs on page 115 3 Under the REX Input heading select the desired input from the Input drop down list 4 From the Schedule drop down list under the REX Input heading select the schedule which will define when the REX can be used Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Doors 5 Select a relock option from the Relock drop down list under the REX Input heading After a valid Request for Exit access the control panel can relock the door as soon as it opens Door opening when the door closes Door closing or if you select Disabled it will relock when the Unlock Time has elapsed see Unlock Time on page 74 Also refer to Selecting the Lock Control
8. check box is selected refer to page 33 When you click one of the Access Level drop down lists all active access levels in the selected site will appear Select the access level s you wish to assign to the card This will determine which doors in the site the card holder will have access to and during which time periods each door can be accessed For information refer to Access Levels on page 83 If two or more access levels are assigned to a card access is granted as long as one of the defined access levels is valid when the card is presented Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Cards E S Setting Card Options The following check boxes can be used to enable or disable the corresponding options or features P LN If the Use Keypad check box has been selected see Use Keypad on page 93 the card holder will have to type the P I N Personal Identification Number recorded in the P I N text box on the system keypad The P I N can be from four to eight digits in length and each digit can be any numerical value from zero to nine The P I N length is also a function of the keypad hardware being used If desired Centaur can automatically generate a unique P I N for you To do so click the drop down arrow to the right of the P I N text field and select the desired P I N length Card Traced Track a card holder s movements by generating a Card Traced event in addition to the Access Grante
9. edit the card Defining Card Badge I Exact match Results NOTE The results window will display the first 250 valid matches The card badge is used to define what will be printed directly on the front and back sides of an access card 1 From the FrontCard window select the Badge tab Select a Template from the list or use the Launch Editor button to create a new template see Launching the Centaur Badge Editor on page 99 Select the language to be used from the Language of user defined text drop list From the Preview s Front Side and Back Side radio buttons select the front or back side preview to be displayed ef FrontCard Site Site 1 Cord Hodder P3 User Delined Data MN Proto ES Badge Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Cards R Launching the Centaur Badge Editor The Centaur Card Template Designer allows defining the front and back side of the badge 1 To launch the editor click on the Launch Editor button Select Template a Select a template and click Load to open the selected template Terea Rename New Delete Cancel b Select a template and click Rename to rename the selected template c Click New to create a new template enter the name of the template and click OK d Select a template and click Delete to delete the selected template e Click Cancel to quit the editor The Centaur Card Template Designer edito
10. Event Definition Overview Every event that occurs in the system can be programmed to perform a series of actions The event definitions are programmed separately for each site in the system A default event definition for all devices can be created as well as separate event definitions for each event related device 1 To select the desired event double click Events from the desired Site branch in the Database Tree View window Right click the desired event and select Properties You Setings for a ia ee EMail CCTV Contal r schedule Access denied Card expired can also select the desired event and press the keyboard Front Door eines sf Enter key The event s properties window will appear e ES Disk Always StS S Yd r Device Activation 2 A list of devices related to the selected event will appear Acti None in the event s Properties window From the Settings for me Ee list select either Default see Programming a Default Dae rr Event Definition on page 134 or Devices see a yl Programming a Device Specific Event Definition on page 134 If necessary select one or more devices from the list 3 Program the event s definitions using the General tab see Event Schedules and Device Activation on page 135 the Alarms tab see Alarm Acknowledgement on page 137 and the CCTV Control tab see Event Activated CCTV Control on page 140 4 Click App
11. Lock Control De energize y page 27 4 From the Number of Controllers drop down list select the number of Cancel controllers you would like to add to this site 5 If you would like to apply the same controller and door settings to all controllers select Apply default settings to all controllers and go to step 6 If you would like to apply different controller and door settings to each controller select Individually setup each controller and go to step 7 6 If you have selected the Apply default settings to all controllers check box a Under Controller Default Settings set the available options as required For more information on these options which include IP Address Port Number and Input Config refer to Setting the Controller Input Configuration on page 57 and Configuring the Controller Communication Settings on page 57 Num Doors allow selecting the number of doors to be created for each controller b Under Door Default Settings set the available options as required For more information on these options refer to Unlock Time on page 74 Selecting the Lock Control Type on page 73 and Reader Type on page 56 Please note that the Door Type option is not yet supported and therefore will be set to Access by default Refer to Selecting a Door Type on page 71 for more information c Click Finish Manufacturing Access Control Since 1985 7 If you have selected the Individ
12. Operator Properties 1 From the Operator Properties window select the Operator Details tab Operator Operator Detais Modules 2 Inthe Logon ID text field type the operator s user name that will be used 00 when logging on to the Centaur server see Starting the Centaur Server Passwort and Software on page 11 Confim Password Permissions All y 3 Inthe Password text field type the password that the operator will use when logging on to the Centaur server see Starting the Centaur Server and Software on page 11 4 Inthe Confirm Password text field retype the Password text field to confirm the use of that password 5 Select the permission you wish to assign to the operator from the Permissions drop down list This determines which system characteristics can be viewed modified and or deleted and which manual controls can be performed Also refer to Permissions see page 151 6 Click OK Assigning Which Software Applications Operators Can Use All of the software applications listed below are automatically installed with the Centaur software Perform the following to enable an operator to use one or Operator Properties more of the software modules automatically installed with Centaur Operator Operator Details Modules J FrontCard Card Editor 7 From the Operator Properties window select the Modules tab T Card Import Export I Database Management I Database Backup Scheduler 8 Sel
13. window will appear 2 From this window select the Advanced tab 3 Click the Remove button e SPXDBase Centaur Database Utility Backup Size Advanced Attach Register the database files with SQL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3Main mdf are located in the same directory as this application Detach Unregister the database files from SQL Server Remove Unregister the databases from SQL Server and remove the files completely Delete events from the event database by Date Please do not use this for reducing the size of the database or purging large numbers of events If the event database is too large then use the Truncate option in the size tab Attach progress Y SPXDBase Centaur Database Utility Backup Size Advanced Attach Register the database files with SQL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3Main mdf are located in the same directory as this application Detach Unregister the database files from SOL Server Remove Unregister the databases from SQL Server and remove the files completely Delete events from the event database by Date Please do not use this for reducing the size of the database or purging large numbers of events If the event database is too large then use the Truncate option in the size tab Attach progress Manufacturing Access Contro
14. 13 Add 15 Relay Relay Relay Add 4 Add Add 8 Relay Relay Relay Relay Relay Relay Relay Relay Add 3 Add 5 Add 7 Add 9 Add 10 Add 12 Add 14 Add 16 Typing the Relay Name Use the Name text field to identify the relay s use or location We recommend using a name that is representative of the device that it is controlling such as Alarm Sounder Relay Also refer to Typing Names and Notes on page 22 Typing the Relay Notes Use the Notes text field to record any additional notes that may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 22 Relay Activation Properties From the Relay Properties window select the Activation tab The Activation tab will allow you to program the relay s activation schedules and activation timers as well as select the relay s normal state i e de energized or energized Selecting a Time Relay Activation Schedule From the Timed activation drop down list under the Schedules heading select the schedule that will activate the relay for the period of time defined by the activation time see Setting the Relay Activation Timer on page 112 At the start time of every period in the selected schedule the relay will activate for the amount of time specified in the Activation time text box regardless of the schedule s end times Refer to Setting the Relay Delay Time Before Activation on page 112 Ma
15. Event Definitions 135 136 Floor Groups 143 Floors 79 Inputs 121 Keypad 73 Timed Activation Relays 111 Unlock 73 Schedule Active 45 Schedule Database Backups 178 Schedule Properties Details 45 Schedule Tab 45 Schedule Tab 45 Schedules 43 Schedules and Doors Access Levels 85 Schedules Can Be Used Where 44 Screen 135 Scrolling Through the Site s Cards 97 Search for a Card in Centaur s Card Management feature 98 Security Level Properties Operations Tab 151 Security Level Tab 149 Security Levels 150 Selecting Events 134 Send ASCII Command 140 Serial Port Connection 27 Server name 22 Setting Centaur as a service under Windows 9 Site Configuration Wizard 24 Site Name 24 Site Programming 23 Site Properties Cards Tab 32 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 E Communications Tab 27 Site Tab 27 Size of Event Database 174 Software Modules 13 152 Speed 30 SpxDBase see Database Management Module 172 Start Date 94 Start Time 46 Starting Centaur s wav Player 182 Starting Centaur s Card Management feature 96 Starting the Centaur Software 17 Starting the Database Managment Module 172 State Relays 173 Status 22 Status Bar 17 22 Status Options 167 Status Cards 94 Status Controllers 167 Status Inputs 168 Status Output 737 169 Stolen Cards 94 System Operator 22 T TCP IP 29 Telephone Number 37 This input activates relay 123 This input bypasses input 121 Time and Attenda
16. None hd I Card Traced dle Production Entrance I Extended Access I Use Keypad Access Level 2 None y I Antipassback Override Access Level 3 None y Interlock Override Access Level 4 None Status Valid EA Start Date Sunday March 16 2008 End Date Sunday March 16 JP Enable Card Traced foso Days Before End Date Notes Programming a card allows you to define the card s specific privileges and any details concerning the card holder Cards can be added individually or in batches Cards can also be added modified and deleted using the Centaur s card management software Centaur s card management software was designed specifically for programming card properties and includes an advanced search engine that simplifies the task of creating and managing several cards For more information refer to Centaur Card Management Feature on page 96 You can also add cards to a site by using the Centaur Card Import Export Feature on page 102 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Cards A In order to program the cards you must first program the site see Sites on page 23 doors see Doors on page 67 holidays see Holidays on page 39 schedules see Schedules on page 43 and access levels see Access Levels on page 83 Adding Cards In the Database Tree View window right click Cards from the desired Site branch and click New Card You ca
17. The Run application on this computer check box is selected by default SpxSvr Properties 4 ax General Location Security Identity Endpoints The following settings allow DCOM to locate the correct computer for this application If you make more than one selection then DCOM uses the first applicable one Client applications may override your selections IV Run application on this computer T Run application on the following computer Browse Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration Click on the Identity tab and select The interactive user check box 2x General Location Security Identity Endpoints Which user account do you want to use to run this application This user User Browse Password Confirm Password The System Account services only Cancel Apply e Click the Security tab to configure the user s that have s the right to access the Centaur Server computer Select the following check boxes Use custom access permissions Use default launch permissions e Use custom configuration permissions Manufacturing Access Control Since 1985 SpxSvr Properties ax General Location Security Identity Endpoints Use default access sta Use default launch permissions Use custom launch permissions You may edit who can launch this application Use default conf
18. The relay s will remain activated for the amount of time defined by the relays Activation Time see Setting the Relay Activation Timer on page 112 Also refer to the example demonstrated in Figure 29 on page 123 1 From the This input activates relay drop down list select the relay that will be activated upon triggering of the input 2 From the Activates relay group drop down list select the relay group that will be activated by the input Figure 29 Example of Activating Relays with an Input In this example when input 2 is triggered relay 4 will activate for the period defined by relay 4 s Activation Time Input 2 Relay 4 Input Properties Relay Properties Input Details Relay Activation Schedules Configuration Normally Closed y Timed activation General y Enabling Schedule Always Activating Never y Input response time 00500 ms m Timings Input restore time 00500 ms Bypass delay 00005 s This input activates relay This input bypasses input None el Activates relay group None Bypass input group None Activation time 015 seconds to 65535 Delay time before activation 000 seconds 0 to 65535 Norractivated state De energize hd In this example when input 4 is triggered it will activate relay 3 4 and 5 for the period defined by their respective Activation Time 15 seconds for relays 3 and 4 and 60 seconds for relay 5 Input 4 Input Pr
19. When the Event database becomes too large you can use the Truncate feature to delete all records including events and alarms from the Event database This will reduce the database file to its original size The Truncate feature will not affect the Main database only the Event database Perform the following to truncate events from the Event database We recommend you make a backup of the database before truncating it For more information see Backing Up Databases on page 173 REFERENCE MANUAL CENTAUR 4 2 Database Management gt T SPXDBase Centaur Database Utility Backup Size Advanced Control the maximum size that the event database can grow hae Purge all records from the event database and shrink the files to their original size Use this option when the event database has become too large All events and alarms will be deleted If you wish to keep the events in the database for future reference make a backup before using this feature 1 After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SoxDBase Centaur Database Utility window will appear 2 From this window select the Size tab 3 Click the Truncate button 4 Click Yes to confirm the truncate action or click No to cancel the truncate operation Attaching Databases This feature is for advanced users only and should not be used frequently Attaching a dat
20. Where Schedules Can Be Used 44 Wizard Controller Configuration 50 Door Configuration 68 Site Configuration 24 Wrong Code on Keypad Output Activation Events 129 Z Zone Speed 127 Zones Input Speed 121 Manufacturing Access Control Since 1985 F REFERENCE MANUAL CENTAUR 4 2 Manufacturing Access Control Since 1985 CDVI Headquarters Si ge social FRANCE Phone 33 0 1 48 91 01 02 Fax 33 0 1 48 91 21 21 CDV AMERICAS CANADA Phone 1 450 682 7945 Fax 1 450 682 9590 CDV BENELUX BELGIUM Phone 32 0 5 662 02 50 Fax 32 0 5 662 02 55 CDV CH SWITZERLAND Phone 41 0 21 882 18 41 Fax 41 0 21 882 18 42 CDV CHINA CHINA Phone 86 0 10 87664065 Fax 86 0 10 87664165 CDV IB RICA SPAIN Phone 34 936 916 551 Fax 34 935 801 278 CDV ITALIA ITALIA Phone 39 0331 97 38 08 Fax 39 0331 97 39 70 CDV MAROC MOROCCO Phone 212 0 22 48 09 40 Fax 212 0 22 48 34 69 Nf gy Manufacturing Access Control since 1985 f t f 2 CDV SWEDEN SWEDEN Phone 46 0 33 20 55 50 Fax 46 0 33 20 55 51 CDV UK Ltd UNITED KINGDOM Phone 44 0 1628 531300 Fax 44 0 1628 531003 DIGIT FRANCE Phone 33 0 1 41 71 06 85 Fax 33 0 1 41 71 06 86 LA GACHE ELECTRIQUE FRANCE Phone 33 0 3 88 77 32 82 Fax 33 0 3 88 77 85 02 a WwWww cdvgroup com PROCOFI FRANCE Phone 33 0 1 41 83 04 90 Fax 33 0 1 41 83 04 91 TE
21. 001 02 Buzzer Door 001 02 Green LED Door 001 02 Red LED m lt E El a in Output Properties Output Events a BR Permissions 1 Operators EX CCTY Commands Access denied Activation time oos seconds 0 to 999 Anti passback status for y Wrong code on keypad Un v Access granted or y On REX granted for REX denied Of y Access time out for y Waiting for keypad for y Keypad time out for If an output event is programmed with Flashing these settings will determine the output flashing rate Define what event s will cause each output to activate I Inverted Door open Off y FT latched Door forced open Off I latched Reader disabled Off y UN Output Timing Properties Door open pre alarm Off vy TW Door open too long Flashing y Door unlocked fon y Tk Door Properties Door General Inputs and Outputs Elevator Control Door Input Input Door 001 01 Contact si Relock Disabled X gt REX Input Input Door 001 01 REX y Relock Door closing Schedule Always Unlock on REX Normal TF Unlock on REX Regardless of Door Status r Interlock Input Input None Schedule Always v Output Activation Anti passback status Access granted Access denied Request to Exit granted Request to Exit denied Access time out Waiting for keypad wid me 18 Ta
22. 100 100 Door open oso foso window and click Properties from the drop down list to display Request to Exit granted 050 010 Door forced open foso 050 the Output Timing Properties window You can also select Requestto Exit denied Joso 050 Doortineaut pre alarm 100 250_ Access time out oso foso Door open too long foso oso Output Timings from the Database Tree View window and Waiting for keypad press the keyboard Enter key alting for Keypad 050 050 Door unlocked 050 050 All times are in milliseconds 2 Inthe Timings tab you will find the same events that are found ar A in the Events tab of the Output Properties window see Setting the Output Activation Events on page 128 3 Inthe On and Off text fields type a value from 0 to 999 milliseconds This will set the rate of flashing for the output 4 Click OK Deleting an Output To delete an existing output right click the output from the appropriate controller branch in the Database Tree View window and click Delete You can also click the desired output and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Outputs e Display Output Status and Manual Controls When you click on the Output Status icon from the toolbar Centaur will display the current live status of the outputs in the system If you wish to manually change the status of
23. 11 PM Sunday night to 7h AM Friday morning must be programmed as follows Period 1 Sunday 2300 to 2400 Period 2 Friday 0000 to 0700 Figure 8 Programming Crossover Periods Schedule Properties Schedule Details Stat End SunMon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hol4 Period 1 2300 2400 Period 2 0000 0700 Period 3 0o00 fooo0 Period 4 0000 ooo Period 5 0000 0000 Period 6 0000 Period 7 0000 ooo Period 8 0000 CO CMC U U A 1 mo m m a o a a mo m m 0 a TUUN UUI Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Schedules a Assigning Holiday Groups to a Schedule Period When defining the schedule s periods see Schedule Periods on page 45 select the Hol1 Hol2 Hol3 and Hol4 check boxes to assign any of the site holiday groups to one or more periods within the schedule For more information on holidays refer to Creating a Holiday and Assigning it to a Holiday Group on page 41 Holiday groups function as follows When you clear a holiday group check box the schedule s period is invalid during holidays assigned to that holiday group e When you select a holiday group check box the schedule s period is valid between its start and end time on any holidays assigned to that holiday group even if the holiday falls on a day that is not enabled in the schedule s period e To create a different start and end time period for holidays only a holiday schedule a
24. 14 Input address 13 amp 14 Z15 16 Input address 15 amp 16 Z1 Input address 17 Z2 Input address 18 Z3 Input address 19 Z4 Input address 20 Z1 Input address 21 Z2 Input address 22 Z3 Input address 23 Z4 Input address 24 Z1 Input address 25 Z2 Input address 26 Z3 Input address 27 Z4 Input address 28 The settings of the DIP switches of each CA A470 A determinent the assignation of the terminal reader or keypad Typing the Input Name Use the Name text field in the Input tab to identify the input s use We recommend using a name that is representative of the device that it is controlling such as REX Input Front Door Also refer to Typing Names and Notes on page 22 Typing the Input Notes Use the Notes text field in the Input tab to record any additional notes that may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 22 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Inputs e Input Properties From the Input Properties window select the Details tab The Details tab will allow you to configure the input s timers normal state schedule and whether a triggered input will bypass an input or activate a relay Input Properties Input Details Configuration Selecting the Input Normal State N C N O Enabling Schedule Always z Input response time 005
25. 2 Controllers e Controller Configuration From the Controller Properties window select the Configuration tab The Configuration tab will allow you to program some of the communication settings Controller Properties as well as select the door and input configurations that will be used with the Controler Configuration Antipassback Expander Door 1 selected controller Reader DEERE Keypad None y Door 2 A A A Reader Standard256 gt Keaton gt For more information on how to set up doors located on the 2 Door Expansion Modules please refer to Door Expansion Module f Input configuration Configuration on page 61 N Cinputs C ATZ2R 16 Inputs ATZ 3A 16 Inputs r Communication IP Address 3 Selecting the Door Reader and Keypad Configuration Port Number T0007 From the Controller Properties window select the Configuration tab o E Active M Notice that when you click the Configuration tab a Reader and a Keypad Controller time out 05000 ms Log Com Failure I drop down list appears for each door Use these fields to configure the Controller response delay 000 ms Fast Event Request 7 controller to function with the readers and or keypads connected to the controller In the Configuration tab the doors will be labeled Door 1 and Door 2 These are directly linked to where on the controller the readers and or keypads are connected as shown in Figure 10 on page 56
26. 2 From the Event Colours window highlight the desired event 3 Clear the Use System Colours check box 4 Select the desired colours from the Text Colour and Background Colour drop down lists 5 Repeat steps 2 to 4 until the desired events are set 6 Click OK Manufacturing Access Control Since 1985 f REFERENCE MANUAL Figure 34 Customizing Event Colours Event Colours BB Centor All Events Bie Yom Qstors Modder Hel Server Started Server Stopped 3 181 B8904 F Stet A Y eS FP Site added Field Time Logged Tne Site modified YRS 11 30 36 AM Ss 11 36 36 AM TAPI error cannot initialize modem TCP IP Communication Error TCP IP Incompatible WinSock Version TCP IP Invalid TCP IP Address Port Number i Sin ye 11 37 35 AM Unknown modem error Waiting for floor selection Waiting for keypad code Text Colour CN Background Colour I Use System Colours coca Operator Timeout The Centaur administration consoles can be programmed to log off automatically when no action has occurred within the software i e programming viewing system status etc for a specified amount of time Operator Timeout Timeout 00000 Minutes 1 From Centaur s main menu select the Options menu and select Operator Timeout Cancel 2 The Operator Timeout window will appear In the Timeout text field type a value in minutes from 0 to 65536 To disable this feature type 00000 3 Click OK Log File Cen
27. 3 From the Schedule drop down list under the Interlock Input heading select the schedule which will define when the Interlock mantrap configuration can be used Manufacturing Access Control Since 1985 f REFERENCE MANUAL Notice how the input selected for the Interlock Input is the same input used for the opposite door s Door Input This is how the controller determines which two doors are used for the Interlock Mantrap application Door Properties Door Properties Door General Inputs and Outputs Elevator Control Door General Inputs and Outputs Elevator Control Door Input 7 Door Input Input Door 002 01 Contact y Input Door 002 02 Contact y Relock Disabled b Relock Disabled z r REX Input gt REX Input Input Door 002 01 REX X Input Door 002 01 REX y Relock Disabled X Relock Disabled z Schedule Always X Schedule Always bd IV Unlock on REX Normal Y Unlock on REX Normal TF Unlock on REX Regardless of Door Status Unlock on REX Regardless of Door Status m Interlock Input Interlock Input Input Door 002 02 Contact X Input Door 002 01 Contact y Schedule Never y Schedule Never y M Output Activation r Output Activation v4 mM mo om ge E M4 V2 F3 Fasa WS5 Te Assigning Outputs to a Door Each controller has six multi function outputs Each controller also supports up to three 2 Door E
28. A460 P Relay Expansion Module adds seven additional relays to the CT V900 A controller Up to two relay expansion modules can be added to each controller for a total of 16 relays per controller Typically the relays are used to activate alarm sounders or other devices such as lighting control units and air conditioners The relays can be programmed to follow a schedule or to activate upon the validity of a schedule and disable after a programmed timer has elapsed In order to add or create one or more relays at least one site and one controller must be created If you have not created a site please refer to Sites on page 23 For more information on setting up a controller refer to Controllers on page 49 When adding relays using the methods described in the following sections you will be required to select an address for each relay These addresses represent a specific relay on the selected controller or on a Relay Expansion Module connected to the controller see Figure 22 on page 111 Manufacturing Access Control Since 1985 REFER Adding Relays If you wish to add one relay or multiple relays at one time right click Relays from the desired controller in the Database Tree View window and select New Relays You can also select Relays and press the keyboard Insert key Select the desired relay address es and click OK ay 01 01 After adding the relay s you will have to configure them within the Relay Properties windo
29. Browse Password Confirm password The system account services only coa If the option is grayed out close the SpxSvr Properties window and go to Program Files CDV Americas Centaur Centaur Server folder and run the Reg Centaur bat file This command will deactivate the auto start service when the OS starts for the Centaur Service Manager Re open the SpxSvr Properties window see step 19 and from the Identity tab select The interactive user option and click OK To reactivate the auto start service when the OS starts for the Centaur Service Manager run the service bat application from the Program Files CDV Americas Centaur Centaur Server folder Manufacturing Access Control Since 1985 m REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration Enabling the Network Access 1 From the task bar click on Start gt Settings gt Configuration Panel gt Administrative Tools gt Local Security Policy E Local Security Settings Fe Acton Vew Mak e 048 Booman member Requre strong Windows 2000 or later session hey Fal irter active logon Do not display lect user name Ea interactive logon Do not require CTRL ALTADEL ESlirtecectivs logon Message text for users attempting to log on 2 The Local Security Settings window will pop up Expand the Local Policies filed to Security Options an click on this folder Double click on the DCOM Machine Access Restrictions in Security Descriptor Defin
30. Chapter 12 Inputs What Will Find Connecting Inputs so onde Plates need eee baht o na Biodiesel ee Pad ee ee eee 116 Adding IMPUtS NN A AN 119 Modifying an put Sci iaa Mid ridad aida beds 119 Deletingsan INPUT s reae ae part a a EA EE EEE Gone wd gos lel eee as 124 Each controller includes eight inputs which can be connected using ATZ Zone Doubling to monitor up to 16 input devices Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 4 inputs each Therefore each controller can monitor the state of up to 28 inputs Typically the inputs are used to monitor and control the status of door contacts and request for exit devices installed on the controlled door The inputs can be programmed to follow a schedule or to activate relays and or bypass other inputs when triggered For additional information on how inputs can be used refer to Door Inputs and Outputs on page 76 Manufacturing Access Control Since 1985 a REFERENCE MANUAL Connecting Inputs Each controller and its assigned 2 Door Expansion Modules can monitor the state of up to 28 inputs such as magnetic contacts motion detectors temperature sensors or other devices Inputs can be installed to a maximum distance of 1000m 3300ft from the controller when using AWG 22 wire The controller and its assigned 2 Door Expansion Modules can only use one of the following input connection methods NC Input Con
31. Communication Properties The Authentication Level specifies security at the packet level Default Authentication Level Connect The impersonation level specifies whether applications can determine who is calling them and whether the application can do operations using the client s identity Default Impersonation Level Identify Security for reference tracking can be provided if authentication is used and that the default impersonation level is not anonymous T Provide additional security for reference tracking Click on Start in Windows type dcomenfg and click OK Type the name of a program Folder document or Internet resource and Windows will open it For you Open Manufacturing Access Control Since 1985 2 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration The Component Services window will appear Expand the Component Services Computers and My Computer branches and click DCOM Config 8 Component Services B File Acton View Window Help es mxa 2 Gla C Console Root DCOM Config 215 objects B e Component Services E E Computers 3 a ER AccStore Class Acrobat AcrobatWri E COM Applications WebCapture 33 DCOM Config Distributed Transaction Coordinator E Running Processes a Event Viewer Local AcroDistX AcroExch P E Services Local ADM Adobe Document Acroba InDesig aS O amp Right click the SpxSvr file
32. Database Tree View window left hand portion of your screen right click the Sites branch and click Add Site You can also click the Sites branch and press the keyboard Insert key A dialogue box appears requesting if you would like to use the site configuration wizard The site configuration wizard guides you through the minimum required settings to get the site communicating with its controllers If you want to use the site configuration wizard click Yes and follow the steps detailed in Using the Site Configuration Wizard Recommended on page 24 If you do not want to use the site configuration wizard click No and go to step 3 If you do not want to add a site click Cancel In the New Site window type the desired site name We recommend using a name that is representative of the site such as Manufacturing Plant Montreal Click OK the Site Configuration Wizard Recommended Site amp Communication Setup settings to get the site communicating Please enter the Site name and select the desired communication settings with its controllers When starting Centaur s Administration Console for the first time or when adding a site a dialogue would like to use the site configuration wizard If you click Yes the Site amp Communication Setup window appears Site Name Manufacturing Plant Montreal General Settings Serial Settings 7 r CommunicationT ype Direct Serial Port y box appears asking if you d
33. Designer Edit Add Photo Ctrl P Edit gt Add Photo Li Add Card Info Ctrl I Edit gt Add Card Info IT Add Static Text Ctrl T Edit gt Add Static Text Add Barcode Ctrl B Edit Add Barcode Card Background Image Ctrl G Card Settings gt Background Image Settings Default Font Ctrl D Card Settings gt Default Font ABG Flip Portrait Landscape Ctrl F Card Settings gt Flip Portrait Landscape Status Bar The status bar is located at the bottom portion of your screen and allows to display the Centaur Card Template Designer status Manufacturing Access Control Since 1985 A PJ REFERENCE MANUAL Centaur Card Import Export Feature Centaur includes a card import and export feature which enables you to export Centaur card data to a csv file or import a csv file containing card data into Centaur s card database This application can be useful for example if you require several card holders to have access to more than one site After creating all the cards in one site export the cards into a csv file from the site containing the desired cards Then import the csv file you created into the desired sites Starting the Centaur Card Import Export Feature Centaur s Card Import Export feature can be started using one of four methods To start this feature from within Centaur click the Open Card Import Export icon from the toolbar or click Modules and click Card Import Export You can also simultaneously press the
34. Doors on page 67 e Access Levels on page 83 Cards on page 87 e Elevator Control on page 105 e Relays on page 109 e Inputs on page 115 e Outputs on page 125 Events on page 133 e Groups on page 141 e Security Levels on page 150 e Permissions on page 151 e Operators on page 152 e CCTV Commands on page 155 Real Time Events Status Window The Real Time Events Status window lists all the events or device status for the selected site see Selected Site on page 19 Use the View See the View menu on page Menu on page 17 menu or the Toolbar button See Toolbar on page 19 to select what you want to view in the Real Time Events Status window When All events Access events Abnormal events or Acknowledged is selected the Real Time Events Status window displays the following Event Name Description Card holder Field Time date and time and Logged Time When Door Relay Input Output status is selected the Real Time Events Status window displays the following Door Relay Input Output Name Address and Status When Controller status is selected the Real Time Events Status window displays the following Controller Name Address Status Number of Cards and Number of Errors Alarms Window The Alarms window lists all the alarms related to all sites The Alarms window displays the following Site Alarm Name Instructions Description and
35. Field Time date and time Manufacturing Access Control Since 1985 Status Bar The status bar is located at the bottom of your screen displays the following Ready Status Status Indicates the status of the Administration Console System Operator Displays the current system operator login name Server name Indicates the name of the server Communication Indicates the site communication status Refer to Communicating with a Site on page 38 for more information Keyboard Indicates the status of your computer keyboard Caps Lock Num Lock and Scroll Lock keys TT System Operator Server name Communication Keyboard Typing Names and Notes When changing the name of a system component in the Database Tree View window i e controllers events doors etc Centaur will immediately refresh the screen Please note that Centaur does not support more than 50 characters for Name fields and 255 characters for Notes fields Use the drop down list on the right of certain text fields to type the text in more than one language see Languages below for more information Languages The Centaur software is a trilingual software Many of the text fields in the property windows when programming sites doors etc will have a drop down list available Use these drop down lists on the right of certain text fields to enter item names and notes in more than one language When a Centaur Administration Console is installed on a wo
36. Master or operator e g John Doe Also refer to Typing Names and Notes on page 22 Typing the Security Level Permission or Operator s Notes Security Level Security Level Database Operations Site 2 Security Level 3 Name Security Level 00 Operator Permissions Permission Sites and Security Levels Permission 3 Name Permission 003 gt Operator Properties Operator Operator Details Modules Operator 3 Name Operator 003 Notes gt In the Notes text field type any important explanations of the selected item and its use Also refer to Typing Names and Notes on page 22 Manufacturing Access Control Since 1985 y REFERENCE MANUAL Security Levels Security levels determine whether an operator can view modify and or delete system characteristics and whether the operator can perform manual controls such as locking and unlocking doors remotely The system characteristics consist of all the elements found in the Database Tree View window such as controllers doors and events Security levels are then assigned to permissions see Permissions on page 151 Setting the Security Level s Programming Rights From the Security Level properties window select the Database tab to define which system characteristics can be viewed programmed and or deleted for the selected site The system characteristics consist of all the Security Level Database Operations
37. Ml IP Searity Polices on Loca ER Merosot network servers Discarect dente when logon hows expre ES Network access Allow enormous SED Name trensieson Ei Network arress Do not alive anonymous enumeraton of SAM accnunts EF Network access Do not show anonymous ermer abon uf SAM sccounts and shares Sel Network acress Do not alos storage af credentials or NET Passports for network authenteabon Bi Network access Let Everyone permissions apply ty anonymous users Network eccess Named Pipes that can be accessed anonymously Network security Force logoff when logon hours expre Ee network security LAN Manager suthentcaton level Bi tetwark senrity LOAP dient signing requirements 5 Network securily Mirian pescan security for NTLM SS based ndudno secure RPC dents Network security Mirmum sesmon security for NTLM SS based induding secure RPC servers Sdinernvery rancele Alne manman adnate bonn Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration moa The Network Access Sharing and security model for local account window will appear From the drop down list click on Classic local users authenticate as themselves and click OK Network access Sharing and security model for local DR ocal Secuny Setting a Network access Shating and security model for local accounts Classic local users authenticate as themselves Classic local users
38. Modifying a Group iii dd dd ti ia da baba 143 Manual Control of Door and Relay Groups 0 0 0 ec tne 145 Siete ia dea a eens eel aera le alle tea nee beeen ay teens dey Dai dae Seb eet ee do ee eed ee ee eA ees Wea ae 145 In the Centaur Access Control System you are often required to select one specific device i e door or relay Centaur provides you with the added option of creating a group A group consists of more than one device Therefore instead of just selecting one device you can select a group which would represent for example relays 3 4 and 5 There are four types of groups Floor Groups Door Groups Input Groups and Relay Groups Manufacturing Access Control Since 1985 What Are Groups When a card is presented to a reader programmed for elevator control Centaur ignores the card s assigned access levels and instead verifies the card s assigned floor group If the floor group s assigned schedule see Selecting a Floor Group Schedule on page 143 is valid Centaur will allow access to the floor group s assigned floors see Assigning Floors to a Floor Group on page 143 The door input and relay groups enable you to create groups of devices such as relays that can be activated or deactivated together when a specified event occurs Table 4 Where are the Groups Used GROUP TYPE Floor Groups USED IN Card Properties CROSS REFERENCE Assigning Access to a Card on page 92
39. Options on page 93 the controller will unlock the door for the duration of the Unlock Time in addition to the value programmed in the Extended access timer In the Extended access text field type a value between 1 and 999 seconds Default 15 seconds This option is particularly useful for individuals that may require more time to access the door Example A card that has the Extended access option enabled is granted access to the Front Door This door s Unlock Time is 15 seconds and its Extended access timer is 30 seconds This means the door will remain unlocked for 45 seconds instead of only 15 seconds Two card rule delay When two card holders are mandatory to access a specific door see Two Card Rule on page 72 the Two card rule delay determines the delay within which the two card holders have to present their cards in order to grant access to the door In the Two card rule delay text field type a value between 1 and 999 seconds Default 5 seconds Manufacturing Access Control Since 1985 f REFERENCE MANUAL Door Inputs and Outputs The Inputs and Outputs tab will allow you to specify the configuration for the door input REX input and its interlock mantrap input as well as select which output s Door Properties can be activated for the selected door Door General Inputs and Outputs Elevator Contei Door Input a Input Door 002 01 Contact X Assigning a Door Input ak Da After installing a
40. Output Properties From the Output Properties window select the Output tab The Output tab will allow you to view the component addresses as well as record the output s name and any additional notes Output Properties Output Events Site 2 Controller 1 Viewing the Output Address Name gt Output 5 At the top of the Output tab Centaur will display the output s address as well as the address of the output s controller and site Please note that the DIP switch settings on each 2 Door Expansion Module determine the address assignment of its output terminals Figure 31 Output Addresses CA A470 A CA A470 A CA A470 A wae mae OUT1 Add 1 OUT1 Add 7 OUT1 Add 13 OUT1 Add 19 OUT2 Add 2 OUT2 Add 8 OUT2 Add 14 OUT2 Add 20 OUT3 Add 3 OUT3 Add 9 OUT3 Add 15 OUT3 Add 21 OUT4 Add 4 OUT4 Add 10 OUT4 Add 16 OUT4 Add 22 OUTS5 Add 5 OUTS5 Add 11 OUTS Add 17 OUTS Add 23 OUT6 Add 6 OUT6 Add 12 OUT6 Add 18 OUT6 Add 24 Manufacturing Access Control Since 1985 Fo REFERENCE MANUAL Typing the Output Name Use the Name text field to identify the output and its use We recommend using a name that is representative of the device that it is controlling such as Door 1 Buzzer Also refer to Typing Names and Notes on page 22 Typing the Output Notes Use the Notes text field in the Output tab to record any additional notes tha
41. Pre alarm time should always be less than the Open too long time see Figure 15 The controller can also be programmed to activate an output when a Door Left Open event is generated see Outputs on page 125 Open Too Long In the Open too long text field enter a value between 1 and 999 seconds Default 60 seconds This value represents the amount of time a door can remain open after an Access Granted or Door Unlock event before generating a Door Open Too Long event see Figure 15 The controller can also be programmed to activate an output when a Door Open Too Long event is generated see Outputs on page 125 Also refer to Pre alarm Time on page 74 Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 4 2 Doors Figure 15 Example of Pre Alarm and Open Too Long Timers i Door is still open After 60 seconds the Door is opened after 45 seconds door has never closed 0 sec 45 sec 60 sec s o s Timer starts Generate Door Left Generate Door Left Generate Door Open event Open event Open Too Long event Generate Input in Alarm event AS Pre alarm timer 45 seconds Open too long timer 60 seconds Extended Access When a card holder is granted access the controller will unlock the door for the period defined by the Unlock Time see page 74 However if the card has been programmed with the Extended option see Setting Card
42. Programming 78 Activating Schedule Relays 112 Timed Relays 111 Activation Tab Relays 111 Activation Time Outputs 128 Activation Timer for Relays 112 Active Access Level 84 Controller Communications 59 Schedules 45 Add a New Card Centaur s Card Management feature 97 Adding Batch of Cards 89 Card s 89 CCTV Commands 156 Controllers 50 Doors 68 Groups 142 Inputs 119 Outputs 127 Relays 110 Security Levels Permissions and Operators 148 Adding a holiday 40 Address Access Level 84 Controller 52 A PJ REFERENCE MANUAL Doors 69 Groups 143 Inputs 119 Operator 149 Outputs 127 Relays 110 Security Level 149 Alarm Acknowledgement 137 Alarm Acknowledgement Options 160 Alarm Acknowledgment Enabling 137 Schedule 137 Alarms Window 21 All events 17 All Events Displaying 164 All Security Levels 150 Alternate Floor Group 143 Anti passback Override 93 Anti passback Reset Input 60 Anti passback Reset Schedule 60 Anti passback Schedule 60 Anti passback Status Output Activation Events 129 Anti passback Tab 60 ASCII Command 140 Assigning a wav File to an Event 182 Assigning Access Levels Cards 92 Assigning Controller Addresses 53 Assigning Floor Groups Cards 92 Attaching Databases 175 ATZ2R 57 ATZ 2R Connection 117 ATZ3R 57 ATZ 3R Connection 118 B Backing up Databases 173 Backup Scheduler 178 Badge editor 99 Baud Rate 30 Beep On Alarms 160 On All Abnormal Evenis 160 On All Access Event
43. Publish this file to the Web 3 E mail this file aha Services X Delete this file Other Places E Control Panel E My Documents 3 My Computer a My Network Places Details Manufacturing Access Control Since 1985 3 Expand the Local Policies branch and click Security Options E Local Security Settings e OXERA Security Settings 4 58 Account Policies Local Policies 24 Audit Policy 9 User Rights Assignment E Public Key Policies E Software Restriction Policies 448 IP Security Policies on Local it Accounts Guest account status IR Accounts Limit local account use of blank passwords to console logon only it Accounts Rename administrator account ite Accounts Rename guest account ie Aut Audit the access of global system objects ie Audit Audit the use of Backup and Restore privilege ie Aut Shut down system immediately if unable to log security audits Es DCOM Machine Access Restrictions in Security Descriptor Definition Language SDDL syntax SJDCOM Machine Launch Restrictions in Security Descriptor Definition Language SDDL syntax ite Devices Allow undock without having to log on ihe Devices Allowed to format and eject removable media el Devices Prevent users from installing printer drivers Devices Restrict CD ROM access to locally logged on user only 0 User Rights Asagimen Seasity Options H E Ahi rey Patines E Software Resticton Polos
44. Security Level elements found in the Database Tree View window such as access View Modify Delete View Modify Delete levels cards and controllers Each system characteristic has three Access Levels p z F Floor Groups F z A Cards Event Definition check boxes labeled View Modify and Delete which are detailed A ee a below Doors TF TF Dutputs mm Door Groups D D Tf Schedules D E View Input O o r Security Levels m E y Input G in ww Sites E If you select the View check box the operator assigned with this i Raye CI Tinge a Os security level will be able to view the details of the associated ra m m Alcecbeined rete characteristic For example if the View check box located next to Access Levels is selected the operator assigned with this security level will be able to view all the programmed access levels in the site Modify If you select the Modify check box the operator assigned with this security level will be able to view add and edit any elements of the associated characteristic For example if the Edit check box located next to Controllers is selected the operator assigned with this security level will be able to view add and edit the site s controllers Delete If you select the Delete check box the operator assigned with this security level will be able to view and delete elements of the associated characteristic For example if the Delete check box located next to Cards is selected the o
45. To enable or disable a door group expand the Door Groups folder within the Database Tree View window right click the desired door group and select the desired Enable Door Group or Disable Door Group command from the drop down list When enabled the door group functions normally When disabled the door group will be deactivated and will not be recognized by the system Activate or Deactivate a Relay Group To activate or deactivate all relays in a relay group expand the Relay Groups folder within the Database Tree View window right click the desired relay group and select the desired Activate Relay Group or Deactivate Relay Group command from the drop down list When activated each relay in the selected relay group will activate for the period specified by the relay s activation timer see Setting the Relay Activation Timer on page 112 Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 16 Operators What Will Find Overview of Operators iene eae dk a ee eed Se dd a is eee ai 148 Adding a Security Level Permission or Operator 2 0 0 ccc tenet teen ee 148 Modifying a Security Level Permission or Operator 0 0 0c nent eee 149 Deleting a Security Level Permission or Operator 0 6 0 cee eens 154 Operators are personnel authorized to program and or monitor the Centau
46. Type on page 73 6 Select the Unlock on REX Normal check box if you wish the controller to unlock the door when the controller receives a valid Request for Exit the door must be closed and locked To unlock the door regardless of its current status i e Door forced Door open too long etc select the Unlock on Rex Regardless of Door Status check box Assigning an Interlock Input This feature allows you to set up the doors for use with Interlock Mantrap applications A mantrap consists of two doors each controlled by a card reader and or keypad When one of the two doors is open or unlock it is impossible to open the other door until both doors are closed Please note that the selected doors must be from the same controller An interlock input is required if the door will be used in a mantrap configuration or to generate Access Denied Interlock Active and Interlock Enabled Disabled by Schedule events A The Interlock Inputs feature cannot be used with doors located on a 2 Door Expansion Module doors 3 to 8 Only the controller s doors can use Interlock Inputs Perform these steps for each of the two doors being used in the mantrap configuration 1 Make sure the door inputs have been programmed see Assigning a Door Input on page 76 2 From the Input drop down list under the Interlock Input heading select the same input that is assigned to the door input of the other door in the mantrap configuration
47. We recommend to use US Robotics 56k hardware modems WIN modem are not supported Manufacturing Access Control Since 1985 Updating the Controller Time Automatically Select the Update CTL time automatically every 15 minutes check box to download the date and time from the PC to all controllers in the site every 15 minutes Clear the check box if you wish to disable automatic date and time update Enabling Offline Buffering Outbox Select the Enable Offline Buffering Outbox check box if you want Centaur to automatically store any system modifications performed while disconnected from the site controllers offline to an outbox table Stored modifications are downloaded to the controller s next time communication is established with the site controllers online This check box is selected by default Site Card Settings Select the Cards tab from the Site Properties window Each site can be programmed with different card settings e apertas sae Comme Cards cctv curp Defining the User Definable Card Fields Dat gt m2 BaF gt Customize the text field headings that appear in the User Defined Data tab of the ME xj FrontCard window Refer to Typing Additional Card Holder Details on page 94 for ae Eaa E inf ion Tet Text 3 Teta Test 4 gt more information Tet a5 j Tete Tews The text you type in the Text 1 to Text 7 text fields will appear next to the Tet T7 first seven text fields respe
48. a Video Switcher Baudrate Site Properties Site Comms Cards Floors CCTV cMPP Activate CCTV Control COM Port Baudrate Data Bits Parity Stop Bits Flow Control In the Baudrate list select a baud rate that is compatible with the video switcher connected to the selected COM port Setting the COM Port Communication Parameters Select the required data bits parity stop bits and flow control settings to communicate with the video switcher connected to the selected COM port Set the following parameters as required Data Bits From the Data Bits drop down list select the number of data bits required to communicate with the video switcher connected to the selected COM port This value is the number of bits used to represent one character of data Most forms of data require eight bits Parity From the Parity drop down list select a parity value that is required to communicate with the video switcher connected to the selected COM port Parity check is an error detection technique that tests the integrity of digital data within the computer system or over a network Each time a byte is transferred or transmitted the parity bit is tested Stop Bits From the Stop Bits drop down list select the number of stop bits required to communicate with the video switcher connected to the selected COM port The stop bit is transmitted after each character Flow Control From the Flow Control drop down list select
49. and click Properties 8 DCOM Config 215 object s 8 Component Services EY Computers E a My Computer m COM Applications DCOM Config m Distributed Transaction Coordinator E Running Processes E gl Event Viewer Local Symdlbrg SymLTCOM SymProtect SymSHAx Ry Services Local 4 a SymUndo SyncMan Systran50 SystranDMA SyncStatus Class mi Manufacturing Access Control Since 1985 The SpxSvr Properties window will appear From the Authentication Level drop down list in the General tab click None SpxSvr Properties 2 x General Location Security Endpoints Identity General properties of this DCOM application Application Name SpxSvwr Application ID E2199D32 D198 11D2 46F9 001 054133541 Application Type Local Server Authentication Level None X Local Path 6 Click the Security tab to configure the user s that have s the right to access the Centaur Server computer e Under Launch Permissions click Customize Under Access Permissions click Customize Under Configuration Permissions click Use Default Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration SpxSvr Properties f 21x General Location Security Endpoints Identity Launch and Activation Permissions presencesansssnsensneeeey a ent Use Default C Customize 7 Inthe Select Users Cont
50. authenticate as themselves Guest only local users authenticate as Guest Manufacturing Access Control Since 1985 REFERENCE MANUAL Configuring the DCOM on Windows XP 1 In Control Panel open the Administrative Tools gt Computer Management Open Local Users and Groups a Computer Management 2 If the computers belong to a workgroup you have to create the users locally before starting if the computers belong to a domain go to step 4 a Create the users locally on the server For this right click on Users and choose New User In this new window type the information about that user and click OK Pay special attention to the user name and password that you are using to open the Windows session b Repeat the previous step for all the users you want to add then go to the next step Manufacturing Access Control Since 1985 j REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration To create the group to be used for DCOM you have to click on the Groups and select New Group Select Users Computers or Groups Select this object lype Users Grup From this location edvamencas loca Common Queries Name Staris wth A Columns Descroton Staris wth Y Find Now Disabled accounts Nov espinng password Jays since last leqor Name RDN E Mal Address Description In Folder Adcmnistiator Admirishaoi c Buill in account cdvamericas loc Ana
51. card rule cd Access denied two card rule 5 Click the button and select the wav file and location Accesi dened twe card iue Cli ck OK Access granted Access granted Antipassba Access granted Floor open Access granted Floor selec 6 Repeat these steps to assign further wav files to events Click Apply Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Appendix A DCOM Configuration What Will Find DCOM Configuration for Windows XP o ooooocc nett tenes 184 DCOM Configuration for Windows 2003 Server 0 cece teeta 206 DCOM Configuration for Windows 2000 Pro and Server 0 ect enete te teae 235 Centaur uses Distributed Component Object Model DCOM to communicate between its software components DCOM is a protocol that enables software components to communicate directly across multiple network transports including Internet protocols such as HTTP in a reliable secure and efficient manner It is necessary to configure the DCOM only when operators need to access the Centaur Server computer from remote computers DCOM configuration is performed on the Centaur Server computer only and sets Windows to allow access from remote workstations creating Windows user accounts Before configuring the DCOM the Centaur Server must be installed refer to Installation Overview on page 3 and t
52. database s into a file with a bak extension These files can later be restored to the SQL Server application used by Centaur see Restoring Databases on page 174 Also refer to What are the Centaur Databases on page 172 We highly recommend that you back up your databases regularly and that these backup files are saved on a form of removable media i e tape backup zip disk etc as well as on your computer s hard drive This safety precaution is an important part of keeping your data safe If for any reason a database becomes corrupt you will be able to restore a backed up file Creating a backup is also useful for keeping a log of events especially if the size of the Event database is limited see Limiting the Event Database s Size on page 174 or to save as a default programming database for future applications 1 After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SpxDBase Centaur Database Utility window will appear From this window select the Backup tab Select the databases you wish to back up by clicking the Main Database and or the Event Database check boxes For more information refer to What are the Centaur Databases on page 172 In the text field corresponding to the selected database s type the full path location where you would like to save the backup and desired file name You can also click the butto
53. door contact use the Door Input settings to enable the ba o controller to supervise the status of a door open closed A door input is used i Input Door 002 01 REX To generate Door Open and Door Forced events Relock Disabled Y To generate Open Too Long and Door Left Open events see Setting the Schedule Always z Door Timers on page 74 IZ Unlock on REX Normal A P Unlock on REX Regardless of Door Status e To effectively use the Anti passback feature see Controller Anti passback Settings on page 60 r Interlock Input ee yan Input Door 002 02Contact e For Interlock mantrap applications see Assigning an Interlock Input on A page 77 Schedule Never y Perform the following to set up a door input Output Activation Wi MP2 Ma Ma Ps Fs 1 A door contact must be installed above the door and it must be connected to an input on the controller see the appropriate controller s Installation Manual 2 The input must be programmed as detailed in Inputs on page 115 3 Under the Door Input heading select the desired input from the Input drop down list 4 Select a relock option from the Relock drop down list under the Door Input heading After a valid access through the use of a card the control panel can relock the door as soon as it opens Door opening when the door closes Door closing or if you select Disabled it will relock when the Unlock Time has elapsed see
54. door name and any additional notes Viewing the Door Address At the top of the Door tab Centaur will display the door address as well as the address of the controller and site to which it is connected The door addresses are represented by which input the door reader and or keypad is connected to see Figure 13 Manufacturing Access Control Since 1985 gt xa REFERENCE MANUAL Figure 13 Controller s Door Address Assignment CT V900 Typing the Door Name Use the Name text field to identify the door and its location We recommend using a name that is representative of the door such as Main Entrance Also refer to Typing Names and Notes on page 22 Typing the Door Notes Use the Notes text field in the Door tab to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 22 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Doors Door Settings Each controller includes 2 reader and 2 keypad inputs which can monitor the state of up to 2 doors Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 2 reader and 2 keypad inputs each Therefore each controller can monitor the state of up to 8 doors The term door refers to any access point controlled by a reader and or keyp
55. field type a value between 500 and 5000 milliseconds Active When the Active check box is selected communication between the Centaur Server and the controller is possible Clear the Active check box to cancel any communication between the controller and the Centaur Server Controller Timeout Enter the length of time the controller will wait for a response from the Centaur Server before generating a Communication Failure locally at the controller Log Com Failure When the Log Com Failure check box is selected Communication Failures between the controller and the Centaur Server are logged Controller Response Delay In the Controller response delay text field type the amount of time 1 to 255 milliseconds that the controller will wait before responding to a command from the Centaur Server Fast Event Request When the Fast Event Request check box is selected the event upload rate is increased in order to prevent lost of events Manufacturing Access Control Since 1985 f REFERENCE MANUAL Controller Anti passback Settings You can use local anti passback to closely monitor the movements of the card holders and prevent any tailgating Tailgating occurs when a card holder does not use a card at the reader and enters through the door opened by another card holder who has already used their card To use this feature the controller must have its doors configured as Entry and Exit doors For more information refer to Doors
56. he pi Input 001 08 input 001 10 input 001 12 input 001 13 input 001 14 Modifying an Input irp 01 15 Add Devices From the desired controller s branch in the Database Tree View window right click the input you wish to modify and click Properties from the drop down list You can also select the desired input and press the keyboard Enter key General Input Properties From the Input Properties window select the Input tab The Input tab will allow you to view the component addresses as well as record the input name and any additional notes Viewing the Input Address At the top of the Input tab Centaur will display the input address as well as the address of the input controller and site Please note that the DIP switch settings on each CA A470 A 2 Door Expansion Module determines the address Deta assignment of its input terminals as demonstrated in Figure 27 on page 120 Site 2 Controler 1 Input 1 Name Door 001 01 Contact gt Input Properties Notes Manufacturing Access Control Since 1985 a REFERENCE MANUAL Figure 27 Overview of the inputs address assignation CA A470 A ae CA A470 A wee ll CA A470 A 2 Z1 2 Input address 1 2 Z3 4 Input address 3 amp 4 Z5 6 Input address 5 amp 6 Z7 8 Input address 7 8 Z9 10 Input address 9 amp 10 Z11 12 Input address 11 8 12 Z13
57. select the input group that will be bypassed upon triggering of the programmed input For more information on input groups refer to Groups on page 141 Manufacturing Access Control Since 1985 3 When an input is programmed to bypass other inputs the Bypass Delay determines how long the input s selected in step 1 and step 2 will remain bypassed The controller will use the Bypass Delay of the input being bypassed not the input Bypass Delay timer of the triggered input In the Bypass delay field type a value from 0 to 65535 seconds If you type a value of 0 second the controller no longer follows the timer and becomes latched This means that the input s will be bypassed until the selected input is triggered again Figure 28 Example of Bypassing Inputs In this example when input 1 is triggered it will bypass input 2 for the period defined by input 2 s Bypass Delay 25 seconds Input 1 Input 2 Input Properties tad Input Properties Input Details Input Details Configuration Normally Closed y Configuration Normally Closed y Enabling Schedule Always y Enabling Schedule Always Input response time ooso0 ms Input response time 00500 ms Input restore time 00500 ms Input restore time 00500 ms Bypass delay F s Bypass delay 00025 s This input activates relay Noe S OCS This input activates relay None This input bypasses input Y This input bypasses input None YS Activates relay group None
58. successfully repaired and you must repeat the repairing process Component Services E O Otstibuted Transachon Coerrinatnr E Running Processes 19 Event Viewer Local i Services Local Manufacturing Access Control Since 1985 mn REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration Setting the Firewall Firewall settings need to be altered on the Centaur Server computer and on any workstation connecting to the Centaur Server computer through DCOM On the server you need to Open the port 135 DCOM port e Allow access In bound and Out bound for the program SPXSVR exe found on C Program Files CDV Americas Centaur Centaur Server Allow access In bound and Out bound for the program sqlsevr exe found on C Program Files Microsoft SQL ServerMSSQL Binn On the workstation you need to Open the port 135 DCOM port LS Please make sure that all your network devices allow DCOM port 135 Please refer to your firewall documentation if you need help If you are using the Windows firewall follow these steps to alter your settings 1 From the taskbar click Start gt Control Panel E Control Panel File Edt View Favorites Tools Heb Om O B Pere rue Address control Panal E Control Panel SY E D Bi G Switch to Categor y View Scanners ard Scheduled Secunty Software K3 Cameras Tasks Center Explorers See as O 9 g P o Windows Update SoundMAX Sounds and System Audio Device
59. the IP address To program the Port the range is from 1 65535 however do not use 21 25 8 or 110 as they are reserved For further details please consult the CA ETHR A Installation Guide Manufacturing Access Control Since 1985 REFERENCE MANUAL Example In Figure 11 the IP Address for controller 1 and 2 would be 10 10 10 2 and the IP Address for controller 3 and 4 would be 10 10 10 3 The port number for controller 1 and 2 would be 10001 and the port number for controller 3 and 4 would be 10001 Figure 11 Example of TCP IP Controller Settings REMOTE SITE CA ETHR A TOPAB Corrs CT V900 A 1 CT V900 A 2 2 Door Controller 2 Door Controller IP Address 10 10 10 2 LAN WAN Port 10001 RS 232 CABLE 7 6m 25ft max RS 485 Up to 1220 m 4000ft REMOTE SITE CA ETHR A TCP IP Converter CT V900 A 3 CT V900 A 4 2 Door Controller 2 Door Controller IP Address 10 10 10 3 LAN WAN Port 10001 RS 232 CABLE 7 6m 25ft max Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Controllers e Poll Timeout The Poll Timeout text field appears only if the selected communication type is TCP IP LAN WAN as described in Selecting the Site Communication Type on page 27 Depending on network traffic you may need to increase this value to improve communication speed between the Centaur Server and the controllers In the Poll Timeout text
60. then assigned to cards in the system see Floor Group on page 92 For more information on elevator control refer to Elevator Control on page 105 Floor Group Properties Floor Group Floors Assigning Floors to a Floor Group All the floors that have been assigned to a site will be listed see Site Floor Settings on page 35 Assign the desired floors to the floor group by selecting their associated check box Serete Md Altemate Floor Group None y Selecting a Floor Group Schedule Access to the floor group s assigned floors see Assigning Floors to a Floor Group on page 143 will be granted when the selected schedule is valid Select the desired schedule from the Schedule drop down list Also refer to Schedules on page 43 Setting an Alternate Floor Group If the selected schedule see Selecting a Floor Group Schedule on page 143 is not valid Centaur will verify the schedule selected as the alternate floor group If the alternate floor group s schedule is valid the card holder will have access to the floors assigned to the alternate floor group Select the desired floor group from the Alternate Floor Group drop down list Manufacturing Access Control Since 1985 Assigning Devices to a Door Input or Relay Group From the Door Input Relay Group Properties window select the Doors Inputs or Relays tab All the devices that have been programmed in the current site will
61. to Select Select Users Contacts Computers or Groups 2 xi Select this object type Users Groups or Other objects Object Types Erom this location ftest2 Locations Enter the object names to select examples dual Advanced OK Cancel Ls Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration J Click on the Check Names button to validate the user s name and click OK to add the user into the group Select Users Contacts Computers or Groups 21x Select this object type Users Groups or Other objects Object Types From this location bpe ooo Locations Enter the object names to select exampl les Francis Dugre fdugre test2 Check Names Advanced Cancel E 1 Redo the step for all the authorized users In the new group s properties the Member of tab click on the Add button Centaur Properties 4 2 x General Members Member Of Managed By Member of Name Active Directory Folder Add Remove This list displays only groups from the local domain Manufacturing Access Control Since 1985 N REFERENCE MANUAL z In the Select Groups window type the model s users in the Enter the Object Names to Select aixi Select this object type Groups or Built in security principals Object Types Erom this location fiest2 Locations Enter the object names to select e
62. you to configure the holiday see Holiday Settings on page 40 Up to 128 holidays can be created in the system Modifying a Holiday From the desired Site branch in the Database Tree View window right click on the holiday you wish to modify and click Properties You can also click the desired holiday and press the keyboard Enter key The Holiday Properties window will appear allowing you to configure the holiday General Holiday Properties From the Holiday Properties window select the Holiday tab This allows you to view some of the system s component addresses as well as record the holiday s name and any additional notes Holiday Properties Holiday Details Site 1 Holiday 1 Typing the Holiday Name Name gt Use the Name text field in the Holiday tab to identify the holiday We Notes recommend using a name that is representative of the holiday such as New Year s Day Also refer to Typing Names and Notes on page 22 Typing the Holiday Notes Use the Notes text field in the Holiday tab to record any additional notes that may be required We recommend that you keep a log of which schedules have this holiday selected Also refer to Typing Names and Notes on page 22 Holiday Settings You can define which days in a year are holidays and then the holidays can be poe assigned to a holiday group If you assign the holiday to one or more holiday groups schedules are valid or invalid depending on how th
63. 0 The reset occurs at the start of every period in the selected schedule refer to Schedule Periods on page 45 or when clicking on the Reset Anti passback button Reset Anti passback The Reset Anti passback button is used to manually reset the global anti passback status of all card holders to unknown This applies only to doors set as Global Entry or Global Exit see Global Entry or Global Exit on page 71 and does not apply to the local anti passback status of the controller see Controller Anti passback Settings on page 60 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Sites Fe Site Floor Settings Select the Floors tab from the Site Properties window The first step in setting up elevator control is to define the number of floors in each site and to give a name to each of these logical floors Up to 64 floors can be controlled per site Ste Comms Cards Floors cctv CMPP Number of floors E Site Properties Number of Floors Define the number of floors that need to be controlled for the selected site by typing a value between 01 and 64 in the Number of floors text field Floor Definition Right click the desired floor select Rename type the desired name and press the keyboard Enter key Please keep in mind that when setting up elevator control the floors always refer to a building s logical floors and not their named floors as shown in Figure 6 F
64. 00 ms Input restore time 00500 ms Bypass delay 00005 From the Configuration drop down list select the input s normal state e g Normally Closed or Normally Open Typically a Normally Closed configuration is used for devices that open upon activation such as door contacts and request for exit detectors Normally Open configurations are used for devices that close upon activation such as smoke detectors and water level sensors This input activates relay None gt This input bypasses input None h Activates relay group None i ypass input group None Selecting the Input Enabling Schedule EN From the Enabling Schedule drop down list select the schedule that will determine when the controller will take into account the input s status i e alarm restore etc The controller will ignore the state of the input when the selected schedule is invalid For more information on schedules refer to Schedules on page 43 Setting the Input Response Time The Input Response Time zone speed defines how quickly the controller will respond to the triggering of an input If the input remains triggered for the period defined by the Input Response Time the controller will log the Input in alarm event and react according to its programming This prevents any momentary glitches from causing unnecessary alarms After adding an input see Modifying an Input on page 119 the Input Properties window can be opened to configu
65. 03 Active N C 2 Note Double click on the name of the controller that you want to edit lt Back Custom Door Setup Lock Ctrl De energize De enerqize De energize De eneraize De energize De enerqize DoorAddress DoorType Reader Protocol Access Standard 26 Bit Access Standard 26 Bit Access Standard 26 Bit Access Standard 26 Bit Access Standard 26 Bit Access Standard 26 Bit Controller Name Controller 001 Controller 001 Controller 002 Controller 002 Controller 003 Controller 003 Door Name Door 001 01 Door 001 02 Door 002 01 Door 002 02 Door 003 01 Door 003 02 Unlock Time Door Contact Rex Inpi Note Double click on the name of the door that you want to edit lt Back Cancel enter the new value in seconds To change the Reader Protocol and or the Lock Ctrl click on the desired controller and select the new settings from the drop lists Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 y Sites Modifying a Site To modify an existing site from the Database Tree View window right click the desired site from the Sites branch and click Properties You can also select the desired site and press the keyboard Enter key The Site Properties window will appear allowing you to configure the site General Site Properties Select the Site tab from the Site Properties window The Site tab will allow you to view A e Site Properties the site a
66. 5 REFERENCE MANUAL CENTAUR 4 2 j Installing and Using Centaur Setting Centaur as a Service Under Windows These instructions pertain to Windows 2000 2003 XP operating systems and will enable the Auto start service when OS starts feature in the Centaur Service Manager This feature will automatically start the Centaur Server when you start the computer You will only need to start the Centaur Administration Console 1 If the Centaur Service Manager is already stopped and has been exited proceed to step 5 Otherwise click Start Programs gt CDV Americas Centaur gt Centaur Service Manager The Centaur Service Manager window will appear 2 Click Stop The Operator Logon window will appear LS The Operator Rights Validation window will not appear if Centaur is set as a service under Windows 3 Enter your Centaur Logon ID and Password and click OK The default Logon ID is Admin and the default Password is Admin 4 From the icon tray right click the Centaur Service Manager icon and click Exit r Centaur Service Manager icon 5 To manually set Centaur as a service under Command Prompt go directly to step 6 Otherwise open Windows Explorer and locate drive C Double click Program Files double click CDV Americas double click Centaur double click Centaur Server and double click Service bat Proceed to step 7 6 To manually set Centaur as a service under Command Prompt click Start Programs gt Accessories gt Comma
67. 9 020 021 022 023 024 025 026 027 028 kikikikikikikikikikikikikikikikikikik k kik k kakakakka N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C N C Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Controllers s 6 Under the Create label Door defaults X select the check box next to 5 e ach door address you Create Controller Address Contact GreenLED RedLED Buzzer M Door 001 01 001 01 1 3 1 2 5 would like to add for each z Door 001 02 001 02 3 3 4 6 Door 001 03 001 03 17 18 7 8 1 controller I Door 001 04 001 04 19 20 3 10 12 l Door 00 05 001 05 21 22 13 14 17 T h h d 3 C Door 001 06 001 06 23 24 15 16 18 7 o change the door s name Door 001 07 001 oF 25 26 19 20 23 9 F F Door 00 08 001 08 27 28 21 22 24 double click on the name of the door and type the new name 8 From the Contact drop down list select the contact s zone input address If there is no contact associated with the door select None 9 From the REX drop down list select the REX s zone input address If there is no REX associated with the door select None Back Finish Cancel 10 From the Green LED drop down list select the green LED s PGM output address If there is no green LED associated with the door select None 11 From the Red LED drop down list select t
68. Activates relay group None Bypass input group Noe Bypass input group None In this example when input 3 is triggered it will bypass Door 001 03 Contact Door 001 04 Contact and Door 001 05 Contact for the period defined by their respective Bypass Delay timers 30 seconds for Door 001 03 Contact Door 001 04 Contact and 125 seconds for Door 001 05 Contact Input 3 Input Group 1 Input Properties X Input Group Properties Input Details Input Group Inputs Configuration Normally Closed y Door 001 01 Contact Door 001 01 REX Enabling Schedule always y Door 001 02 Contact E Door 001 02 REX Input response time 00500 ms Door 001 03 Contact Bypass Delay Timer set to 30 Input restore time ooso0 ms Door 001 03 REX Door 001 04 Contact Bypass Delay Timer set to 30 Door 001 04 REX This input activates relay None e Door 001 05 Contact Bypass Delay Timer set to 125 Door 001 05 REX This input bypasses input Door 001 02 Contact y Door 001 06 Contact e Door 001 06 REX Activates relay group None zl Door 002 01 Contact Bypass input group AA y Dost edirne Bypass delay GF a Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Inputs e Activating Relays with an Input When an input is triggered the controller can be programmed to activate one relay or a group of relays
69. All rights reserved Specifications may change without prior notice One or more of the following US patents may apply 6215399 6111256 5751803 5721542 5287111 5119069 5077549 5920259 5886632 Canadian and international patents may also apply Centaur is a trademark or registered trademark of CDVI Americas Ltd or its affiliates in Canada the United States and or other countries Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems INDEX Symbols wav Player 153 181 Numerics 2R Connection 117 3R Connection 118 A Abnormal Events 164 Abnormal events 17 Access Denied Output Activation Events 129 Access Events 164 Access events 17 Access Granted Output Activation Events 129 Access Level Active 84 Access Level Assignment Cards 92 Access Level Programming 83 Access Level Properties Access Level Tab 84 150 Doors amp Schedules Tab 85 Access Rights Operator 152 Access Time out Output Activation Events 129 Access Door Type 71 Acknowledged Events 137 164 Acknowledged events 17 Acknowledging Alarms 138 Action 136 Activate a Relay Group 145 Activate Output 169 Activate Output Timed 169 Activate Relay Anti passback 60 Manufacturing Access Control Since 1985 Activating Devices via Events 136 Outputs Manually 131 169 Relay Groups 123 Relays Manually 166 Activating Outputs Door
70. CHNO EM FRANCE Phone 33 0 4 42 96 58 73 Fax 33 0 4 42 96 45 77 CDVI reserves the right to change any of its products and specifications at anytime without prior notice
71. Ctrl and F2 keys To start Centaur Card Import Export feature without Centaur running 1 Click Start Programs CDV Americas Centaur Administration Console and click Card Import Export 2 From the Logon window type the appropriate Logon ID and Password Centaur Card Import Export feature uses the same logon IDs and passwords as Centaur 3 Click OK Exporting Cards 4 After starting Centaur Card Import Export feature click Next 5 Select Export Cards click Next and click Next again 6 Select the site that contains the card data that you want to export and click Next 7 Type the name of the csv file that you want to create or click the button to select a file name and location Click Next The default export file location is My Documents 8 Select a delimiter that will separate the card data fields If you want the name of each field to appear in the first row i e last name card number etc select the First row contains field names check box Click Next 9 Items in the bottom list box represent data fields that will be exported into the csv file Highlight the desired data fields from either list box and click the Add and Remove buttons until the desired data fields appear in the bottom list box Click Next 10 Click Finish A message appears indicating that the information has been successfully exported Click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 y Cards Imp
72. EM The operating system Users Users are prevented from making accide Administrator Built in account for administering the con Built in account for guest access to the c Show Users Members Search Add Names Type of Access allow Access y DK Cancel Help Manufacturing Access Control Since 1985 REFERENCE MANUAL The selected users will appear in the Registry Value Permissions window Click OK Registry Yalue Permissions i x Registry Value AccessPermission Owner Account Unknown Name John Doe John Doe O eccess amp User 1 User 1 Allow poe 6 User 2 User 2 Allow Access Type of Access AlowAccess y Lo A dats E tee 3 Click Apply and OK Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Control Software Access Control Systems Appendix B Warranty CDVI Americas Ltd Seller warrants its products to be free from defects in materials and workmanship under normal use for the period of one year Except as specifically stated herein all express or implied warranties whatsoever statutory or otherwise including without limitation any implied warranty of merchantability and fitness for a particular purpose are expressly excluded Because Seller does not install or connect the products and because the products may be used in conjunction with products not manufactured by Seller Seller cannot guarantee the perfor
73. ENCE MANUAL 4 2 ing the Centaur User Interface The Modules menu gives access to the following FontCard Refer to Centaur Card Management Feature on page 96 for more information Card Import Export Refer to Centaur Card Import Export Feature on page 102 for more information Database Management Refer to Database Management Module on page 172 for more information Database Backup Scheduler Refer to Database Backup Scheduler on page 178 for more information FrontGuard Locator WavePlayer Refer to Centaur Wave Player on page 181 for more information Pro Report FrontView Diagnostic Tool Headcount The Help menu gives access to either the Centaur help file or the about Centaur page Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 j Understanding the Centaur User Interface Tas Toolbar The Toolbar is divided in different categories as described in the following picture Events Status Selected Site Modules About E E E Sess EEEE E wee Bls Selected Site Select which site to view and or act upon Toolbar Buttons The following table describes each Toolbar button KEYBOARD CATEGORY BUTTON DESCRIPTION SHORTCUT MENU Events All events J Refer to Display All Events on page 164 for 1 View gt All more information Access events Refer to Display Access Events on page 164 2 View gt Access events for more inf
74. ERENCE MANUAL General Tab 71 Inputs and Outpuis 76 Door status 17 Door Tab 69 Door Timers 74 Door Type 71 Door Unlock Schedule 73 Door Unlocked Output Activation Events 130 Doors 67 Doors amp Schedules Access Levels 85 Download 64 E Editing a Scheduled Database Backup 179 Elevator Control 79 105 Elevator Door Type 71 E Mail Activation 139 Enable a Door Group 145 Enable Card Traced 94 Enable Door Manually 165 Enable Input 168 Enabling a Schedule 45 Enabling Schedule for Inputs 121 Enabling the Access Level 84 End Date 94 End Time 46 Energized Lock Control 73 Energized Relay State 113 Entry Door Type 71 Entry Global 71 Entry Exit Unlock Both 61 Event Colour Definitions 161 Event Database 172 Event Database Size 174 Event Definition 133 Alarms Tab 137 CCTV Control tab 140 Command 140 General Tab 135 Instructions 137 Requires Acknowledgement 137 Schedule 135 136 137 139 140 Selecting Events 134 Video Switcher Protocol 140 Event Display 164 Event Options 160 Event Request 59 Events Display Abnormal 164 Display Access 164 Display Acknowledged 164 Display All 164 WAV file assignment 182 Events Colours 17 Events Output Activation 128 Exit Door Type 71 Exit Global 77 Exporting Cards 102 Extended Access 93 Extended Access Levels Levels 3 4 33 Extended Access Time 75 F Family Number 91 Family Number Maximum 34 Fast Event Request 59 File 17 Firmware Update 63 Floor Group Properties F
75. Find Out the Card Number K Centaur AU Events File View Options Modules Help 02 ew oe o 4 bs Jo SOVGBAM Be EF 2 E centaur Event Name Description Card Holder Field Time Logg 8 Sites Card modified Administrator Paul Smith 150 1 14 02 2008 10 38 14 02 2008 T g Site 1 Card modified Administrator John Edwards 150 2 14 02 2008 10 38 14 02 2008 4 Cards SAL John Edwards Family Number Card Number gt ETRE Click on the button to load or add a card using a CMPP card enrolment station This button is only available when the Activate CMPP check box is selected refer to Activating CMPP for a Site on page 37 Assigning Access to a Card The Floor Group Access Level 1 to Access Level 4 drop down lists identify which doors and floors the card holder can access Floor Group To obtain access to a door defined for elevator control the desired cards must be assigned a valid floor group If the selected site has been set up for elevator control a list of existing floor groups will appear in the Floor Group drop down list Select the floor group you wish to assign to the card This will determine which floors and during which schedule a card holder will have access For more information on floor groups refer to Groups on page 141 Access Level Up to two access levels can be assigned to each card by default and up to four when the Extended Access Levels Levels 3 4
76. For example if the Access Granted event is set to On for output 2 but output 2 has not been assigned to a o or Z Wrong code on keypad Of El door the output will never activate To set the output s Reagent ly El Door open Off z I latched activation events perform the following Access denied Off z Door forced open On v latched REX granted Off Reader disabled Off w D latched 1 From the Output Properties window select the Events tab REX denied Off Door open pre alarm Flashing x M latched Access time out Off Y Door open too long On y latched 2 Inthe Events tab you will find 15 events which are vell Y i Door unlocked Off v J latched described in the following sections Each event has a pelle ot zl drop down list allowing you to select Off On or Flashing Select the desired setting for each event e If you select Off the selected event will never activate the output If you select On the output will activate for the amount of time defined by the Activation Time see step 4 when the corresponding event occurs If you select Flashing the output will activate for the amount of time defined by the Activation Time see step 4 and will flash according to the rate defined by the programmed Output Timings see Setting a Flashing Output s On Off Timers on page 130 when the corresponding event occurs Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Outpu
77. Holidays 41 Inputs 124 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 i y Outputs 131 Relays 113 Schedules 47 Security Levels Permissions or Operators 154 Sites 38 Deleting Databases 175 176 Deleting Databases See also Purging Databases and Remov ing Databases Detaching Databases 176 Details Tab Holiday Programming 40 Details Tab Schedule Programming 45 Device 136 Device Activation Events 136 Device Specific Event Definition 134 Diagnostic Tool 13 18 154 Dial up Number 37 Dialup Site 28 Dip Switches Controllers 53 Direct Serial Port Connection 27 Disable aDoor Group 145 Disable Door Manually 165 Disable Input Manually 168 Disconnecting 38 Disk Event Definitions 135 Display Abnormal Events 164 Access Events 164 Acknowledged Events 164 AllEvents 164 Controller Status 167 Door Status 81 Input Status 168 Output Status 169 Relay Status 113 166 Display Door Status 81 Display Notification Message 160 Displaying Events 164 Distributed Card Programming 33 Door Configuration 55 Door Expander s Configuration 67 Door Forced Open Output Activation Events 130 Door Groups also see Groups 144 Assigning Doors to a Door Group 144 Enable or Disable 145 Lock or Unlock 145 Door Input 76 Door Open Pre alarm Output Activation Events 130 Door Open Too Long Output Activation Events 130 Door Open Output Activation Events 130 Door Properties Door Tab 69 Elevator Control 79 A PJ REF
78. Inthe RUN window type dcomcnfg exe Click OK or press the keyboard Enter key Manufacturing Access Control Since 1985 7 REFERENCE MANUAL guration The Distributed COM Configuration Properties window pops up Highlight SpxSvr from the list and click on Properties Distributed COM Configuration Properties ax Applications Default Properties Default Security Default Protocols Applications SENS Logon Events SENS Network Events SENS OnNow Events SENS Subscriber for EventSystem EventObjectChange events Sound Recorder SpxCard Application SPXComms Voice Dictation Manager Windows Management Instrumentation Windows Media Player Windows Update Agent Remote Access Windows Update Agent 1 Windows Update Agent 2 Windows Update Agent User Interface for Published Applications WordPad Document WSHRemote z Properties Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration The SpxSvr Properties window pops up In the Authentication Level drop down list choose None General Location Security Identity Endpoints General properties of this DCOM application Application name SpxSvr Application type local server Authentication Level Local path C PROGRA 14 CDVAME 1 Centaur CENTAL Manufacturing Access Control Since 1985 Click on the Location tab and select the Run application on this computer check box NB
79. K Ohm 1K Ohm 22K Ohm 1K Ohm Address 5 Address 6 EOL 1K Ohm 22K Ohm 1K Ohm EOL 23 1K Ohm COM 256 COM z4 z7 8 a wr 1K Ohm 1K Ohm Address 7 Address 8 1K Ohm 1K Ohm 22K Ohm Address 9 Address 10 1K Ohm 22K Ohm po 1K Ohm Z9 10 COM 211 12 EOL Address 11 Address 12 1K Ohm 1K Ohm 2 2K Ohm Address 13 Address 14 1K Ohm 22K Ohm o 1K Ohm 213 14 COM 215 16 EOL Address 15 Address 16 1K Ohm 1K Ohm 22K Ohm Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Inputs Adding Inputs In order to add one or more inputs at least one site and one controller must be created If you have not created a site please refer to Sites on page 23 For more information on setting up a controller refer to Controllers on page 49 When adding inputs using the methods described in the following sections you will be required to select an address for each input These addresses represent a specific input on the selected controller as described in Connecting Inputs on page 116 To add one input or multiple inputs at one time right click Inputs from the desired controller in the Database Tree View window and select New Inputs from the drop down list You can also select Inputs and press the keyboard Insert key Select the desired input address es and bt click OK After adding the input s you will have to configure them within the Input Properties rut 001 05 window see Modifying an Input on page 119
80. Local Server Authentication Level z Local Path 8 Click the Location tab and select the Run application on this computer check box NB The Run application on this computer check box is selected by default Click the Identity tab and select the The interactive user check box SpxSvr Properties ax General Location Security Endpoints Identity Which user account do you want to use to run this application The launching user This user User Browse Password Confirm password The system account services only Manufacturing Access Control Since 1985 Click the Security tab to configure the user s that have s the right to access the Centaur Server computer SpxSvr Properties _2 x General Location Security Endpoints Identity Launch and Activation Permissions C Use Default Customize Use Default Customize Access Permissions 2 a Under Launch Permissions click Customize b Under Access Permissions click Customize c Under Configuration Permissions click Use Default 9 Under Launch Permissions click the Edit button Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration The Launch Permission window will appear Click the Add button to add users Access Permission 10 The Select Users or Groups window will appear Verify that the Object Type and the Location is c
81. Maria edvamericas loc ard Cot acceM cdyvamer edvamericas loc pi Centaur Group edvamericas loc Cert Pubishers Members of the cdvamericas loc Cosmin Flores clloescu cdva cdyamericas loc Dania Tawfik edvamericas loc Ls DHCP Admiri Members who h cdvamericas loc DHCP Users Members who h edvamericas loc a Dns4dnins DNS Acmnistrat cdwamericas loc 2 DnsUcdateP DNS clierts who cdvamericas loc 3 In the field Name type Centaur Group Click on the Add button to add the users that you want to have access to the Centaur Server 4 The window Select Users Computers or Groups pops up Click on the Advanced button and check if the Object Types and Locations are properly set and click on the Find Now button Select from the list the users you want to access the Server For a multiple selection keep pressed the keyboard Ctrl key while selecting the names from the list Click OK 5 The selected users will appear in the Select Users Computers or Groups and the Enter the object names to select examples field Click OK 6 Click Close 7 From the taskbar click Start gt Run Manufacturing Access Control Since 1985 gt N REFERENCE MANUAL In the Run window type dcomenfg exe Click OK or press the keyboard Enter key TC 2x Type the name of a program folder document or 7 Internet resource and Windows will open it For you Open dcomcnfal y
82. NCE MANUAL CENTAUR 4 2 5 The Add a Program window will appear Click Browse and select the spxsvr exe file located by default in C Program Files CDV Americas Centaur Centaur Server and click OK Manufacturing Access Control Since 1985 F ATT i REFERENCE MANUAL figuration 6 The Windows Firewall window will re appear From the Exceptions tab make sure that the spxsvr exe check box below the Programs and Services heading is selected 7 From the Exceptions tab click Add Program The Add a Program window will appear Click Browse and select the sqlsevr exe file located by default in C Program Files Microsoft SQL ServerMSSQL Binn and click OK Add a Program To allow communications with a program by adding it to the Exceptions list select the program or click Browse to search for one that is not listed Programs O PaBoot 8 PQBoot for Windows lt Pro Report QQ Quick Time Player QuickTour Y Path C Program Files Microsoft SQL ServerMSSQL Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration moa The Windows Firewall window will re appear From the Exceptions tab make sure that the sqlsevr exe check box below the Programs and Services heading is selected Windows Firewall General Exceptions Advanced Windows Firewall is tumed off Your computer is at risk of attacks and intrusions from outside sour
83. NDOWS system32 cmd exe s Technical Support gt cd systemrootz system32 install Manufacturing Access Control Since 1985 A PF REFERENCE MANUAL Verifying if the DCOM has been repaired Perform the following steps to verify that DCOM has been repaired From the taskbar click Start gt Run The Run window will appear Enter dcomcnfg exe in the text box and click OK z Type the name of a program folder document pal Internet resource and Windows wll open E for you Opens SE v The Component Services window will appear In the Console Root folder left side of your screen expand the Component Services branch the Computers branch and the My Computer branch If there is a red arrow next to any of the components of this folder DCOM has not been successfully repaired and you must repeat the repairing process Component Services Manufacturing Access Control Since 1985 n REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration Setting the Firewall Firewall settings need to be altered on the Centaur Server computer and on any workstation connecting to the Centaur Server computer through DCOM In your firewall you have to Open the port 135 DCOM port Allow access in entry and exit for the program SPXSVR exe found on C Program Files CDV Americas Centaur Centaur Server on BOTH workstation and server On the server only you need to allow access in entry and exit for the program sq
84. NNECTIONS FOR CT V900 A CONTROLLER Address 1 Address 2 Controller 1K Ohm 2 2K Ohm Inputs 21 2 COM 234 Address 3 Address 4 1K Ohm 22K Ohm Address 5 Address 6 1K Ohm 2 2K Ohm 25 6 COM 27 8 Address 7 Address 8 1K Ohm 2 2K Ohm Address 9 Address 10 1K Ohm 2 2K Ohm Z9 10 COM 211 12 Address 11 Address 12 1K Ohm 2 2K Ohm Address 13 Address 14 1K Ohm 2 2K Ohm 213 14 COM 215 16 Address 15 Address 16 1K Ohm 2 2K Ohm Manufacturing Access Control Since 1985 ATZ 2R CONNECTIONS FOR CA A470 A 2 Door Exp 1K Ohm Inputs Z1 COM Z2 1K Ohm 1K Ohm Z3 COM Z4 1K Ohm o REFERENCE MANUAL ATZ 3R Connection Method When this option is selected see Setting the Controller Input Configuration on page 57 the controller will generate an alarm condition when the state of an input is toggled opened An alarm condition will also be generated when a wire fault short circuit or a cut in the line occurs Connect two devices to each controller s input but only one device to each 2 Door Expansion Module s input For address assignment of the 2 Door Expansion Module s inputs refer to Viewing the Input Address on page 119 Figure 26 ATZ 3R Input Connection Method ATZ 3R CONNECTIONS FOR ATZ 3R CONNECTIONS FOR CT V900 A CONTROLLER CA A470 A Address 1 Address 2 Controller 2 Door Exp 1K Ohm 22K Ohm EOL Inputs 1K Ohm EOL Inputs 1K Ohm 1K Ohm Z1 2 Z1 COM COM 23 4 z2 EOL EOL Address 3 Address 4 1K Ohm 1K Ohm 1
85. Q covi Access Control Software E Version 4 2 A PF REFERENCE MANUAL Copyright C 2006 2008 CDVI Americas LTD All rights reserved Centaur access control system software is protected by copyright law and international treaties Unauthorized reproduction or distribution of this program or any portion of it may result in severe civil and criminal penalties and will be prosecuted to the maximum extent possible under law All other brand and product names are trademarks or registered trademarks of their respective companies The information contained in this publication is subject to change without notice Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software ae Table Of Contents INSTALLING AND USING CENTAUR isis 1 Centaur EQIIONS cecilia aos cae bere iba daria 2 Installation QVEM EW ono ir aldea cel a aA A A aE EE E a soles 3 EEE E E EE A E E E T E E E E S E A E AE NET 3 Centaur Administration Console Workstation ccceesceeececeeeeeeeeeeeeeeeeeeeeeecaeeeeaeeeaeeseaeeseeeseaeeeaeeseaeseaeesaeseaeeseeseaeesieeseeesieeeeneene 7 Setting Centaur as a Service Under WindOWS ccceeceeeceeeeeeeeeeneeceaeeeeeeseaeeeseeeaeecaeeseeeeeaeeseaeseaeesaeesaeseaeeeeeseaeesieeseaeetieeeeeene 9 Plugging the Hardlock Key iii debt aaan aan aaaea ENE NaRa Aa aaa aaae aana sanaaa adaa 10 Starting the Centaur Server and Software 0 cccecceesceeeeeeese
86. R To other controllers fil RS 485 or i NULL MODEM DB25 to DB9 CABLE i 7 6m 25ft max i REMOTE SITE Modem CT V900 A 8 2 Door Controller A First controller of a site i 7 6m 25ft max To other remote sites CA A360 USB RS 232 RS 485 Converter ar Can be up to 1 220m controllers 4000ft away from RS 485 the controller LS Using the Dialup connection method limits the amount of controllers to 64 Manufacturing Access Control Since 1985 7 REFERENCE MANUAL CENTAUR 4 2 as es TCPAP LAN WAN Select this method to have a site controllers that communicate over a TCP IP network To do so you must connect one or more TCP IP converter CA ETHR A as shown in Figure 2 The CA ETHR A converts the RS 232 communication protocol into the TCP IP protocol After selecting TCP IP LAN WAN you are required to further set the site properties See Selecting the Site Speed on page 30 Selecting the Site Communication Schedule on page 30 and you must also set the TCP IP communication settings of each controller as detailed in Configuring the Controller Communication Settings on page 57 All other settings will be unavailable The CA ETHR A converter is recommended as it has been tested with our products Visit our website at www cdvi ca for more information Figure 2 TCP IP Connection REMOTE SITE CA ETHR A CT V900 A TCP IP Converter 2 Door Control
87. RENCE MANUAL CENTAUR 4 2 Access Control Software e 2 Access Control Systems Chapter 18 Options What Will Find General C ntaur Options asasen RN ee ie ee eee aa dd aie lin ee eed Geb eee 160 Event Colour Detinitions sissors cuca el eaten ap skews Rake Mo ae Sarda A ae oie Reis a pal Dane Meee eRe eae Pee beget 161 Operator TMeOUL sasea iros beh Mil ed edad had del idad ddr 162 TOG Ple Sti d acest acd nae ack Rh a a atch iS te o Es 162 The Centaur software can be programmed to provide visual and or auditory feedback when specific events or alarms occur in the system You can also determine at what frequency in seconds that Centaur will update the Real Time Events Status window The colours of each event that appear in the Real Time Events Status window can be customized to your needs You can also set the Centaur administration consoles to automatically log off if no action has occurred after a specified amount of time Manufacturing Access Control Since 1985 y REFERENCE MANUAL General Centaur Options From Centaur s main menu bar select the Options menu and select the Options command from the drop down list The Options window will appear allowing you to set Centaur s visual and or auditory feedback options as well as determine how often Centaur I Display a notification message will update the Real Time Events Status window The options are detailed below Beco Play alarm wave non stop Setting A
88. REX Input Request for Exit on page 76 has been triggered REX denied The output can be activated when a REX denied event occurs other than the REX Denied Schedule Invalid event i e interlock enabled Access time out The output can be activated when access has been granted but the door was never opened during the unlock period see Unlock Time on page 74 and Extended Access on page 75 Waiting for keypad When both a reader and a keypad are required for access see Use Keypad on page 93 the output can be activated as soon as the reader has granted access Keypad time out When both a reader and a keypad are required for access see Use Keypad on page 93 the output can be activated when the reader grants access but no P I N is entered on the keypad within 30 seconds Wrong code on keypad The output can be activated when an incorrect code is entered on a keypad after a valid access card is presented see Use Keypad on page 93 Door open The output can be activated whenever an access control door is opened see Assigning a Door Input on page 76 Also when using this event the output can be latched Manufacturing Access Control Since 1985 Door forced open The output can be activated whenever an access control door is forced opened see Assigning a Door Input on page 76 Also when using this event the output can be latched Reader disabled The output can be
89. a OO tuci n ra ole 69 Deleting a Dogi oia aida da id ad ti dean itt ada tb dci ici do 80 Display Door Stats oies a A a a Gi gence aa 81 Each controller includes 2 reader and 2 keypad inputs which can monitor the state of up to 2 doors Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 2 reader and 2 keypad inputs each Therefore each controller can monitor the state of up to 8 doors The term door refers to any access point controlled by a reader and or keypad such as a door turnstile gate cabinet etc To control entry and exit to an access point a reader and or keypad can be used on both sides of the door This also provides the ability to set up Interlock mantrap or Anti passback applications The use of door contacts on all controlled doors is highly recommended since it greatly enhances the level of security provided by an access control system Many of the door s programmable options can only be used if a door contact is installed Manufacturing Access Control Since 1985 Adding Doors In order to add one or more doors at least one site and one controller must be created If you have not created a site please refer to Sites on page 23 For more information on setting up a controller refer to Controllers on page 49 When adding doors you will be required to select an address for each door refer to Viewing the Door Address on page 69 Perf
90. abase will tell the SQL Server application used by Centaur to begin using the databases located in C Program Files CDV Americas Centaur Centaur Server Data Make sure that the Centaur3Main mdb Centaur3Events mdb and the spxDBase exe files are located in the above mentioned path Please note that before attaching the database the database files currently used by Centaur need to be detached or removed see Detaching Databases on page 176 or Removing Databases on page 176 Verify that Centaur and the Centaur Service Manager applications are closed and that the SQL Server is running Perform the following to attach the database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SpxDBase Centaur Database Utility window will appear 2 From this window select the Advanced tab 3 Click the Attach button Manufacturing Access Control Since 1985 7 SPXDBase Centaur Database Utility Backup Size Advanced Attach Register the database files with SOL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3Main mdf are located in the same directory as this application Detach Unregister the database files from SQL Server Remove Unregister the databases from SQL Server and remove the files completely Purge Events Delete events from the event database by Date Please do not use this for reducing the siz
91. activated whenever a programmed door has been manually disabled see Displaying and Controlling the Status of a Door on page 165 Also when using this event the output can be latched Door open pre alarm The output can be activated whenever a Door Left Open event occurs This occurs when the door has been open for the duration of the Pre alarm timer see Pre alarm Time on page 74 Also when using this event the output can be latched Door open too long The output can be activated whenever a Door Open Too Long event occurs This occurs when the door has been open for the duration of the Open Too Long Timer see Open Too Long on page 74 Also when using this event the output can be latched Door unlocked The output can be activated whenever an access control door is unlocked Also when using this event the output can be latched Setting a Flashing Output s On Off Timers If any of the output s selected events have been set to Flashing see Setting the Output Activation Events on page 128 you must Output Timing Properties define the rate of the output s flashing for each event The Output Timings are programmed for each event and not per output On of On of therefore affecting all outputs To do so Antipassback status EEE 008 Keypad time out 050 050 Access granted oso foso Wrong code on keypad foso foso 1 Right click Output Timings from the Database Tree View Access denied
92. acts Computers or Groups window type the group s name you have created in the Enter the Object Names to Select Manufacturing Access Control Since 1985 x a REFERENCE MANUAL guration Select Users Contacts Computers or Groups ax Select this object type Users Groups or Other objects Object Types From this location ftest2 Locations Enter the object names to select examples Cent ra OK Cancel Advanced Click on the Check Names button to validate the name of the group and click OK Select Users Contacts Computers or Groups E 21x Select this object type Users Groups or Other objects Object Types From this location be a Locations _ Enter the object names to select examples Centaur Group Check Names Advanced Cancel E Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration moa Select the four check boxes in the Permisions for Centaur window and click OK axi Security Group or user names sel Administrators TEST Administrators FB Centaur TEST Centaur ER INTERACTIVE Local Launch Remote Launch Local Activation Remote Activation Manufacturing Access Control Since 1985 In the Security tab click on the Modify button to change the Access Permisions section E zx General Location Security Endpoints Identity Launch and Activat
93. ad such as a door turnstile gate cabinet etc To control entry and exit to an access point a reader and or keypad can be used on both sides of the door This also provides the ability to set up Interlock mantrap or Anti passback applications Centaur enables you to define a specific configuration for each door as well as set the door s various timers Selecting a Door Type Depending on the hardware configuration being used for the selected door you must select the appropriate door type for the selected door From the Door Properties window select the General tab From the Door Type drop Dos down list select the required door type pore Door Properties General Inputs and Outputs Elevator Control Door Type z Reading device Reader a Lock Control De energize y Keypad Schedule Schedule 003 x Access Select the Access door type if you plan to use the controlled entry one reader access configuration This means the reader will be located on one side of a door with no reader on the other side Unlock Schedule Schedule 003 Z Reading Timings IV Opened I Unlocked Unlock time 005 Pre alarm time 045 Elevator When using CA A480 Elevator Controllers refer to Elevator Control on page 105 a reader can be installed inside an elevator When you select Elevator from the Door Type drop down list Centaur tells the controller that the selected door reader will be installed inside an Unlock on
94. ader before being granted access Anti passback Override When the Anti passback Override check box is selected all the controllers in the site will ignore the anti passback status of the card see Enabling Controller Anti passback on page 60 Interlock Override An interlock installation consists of two doors each controlled by a reader Access will not be granted to a door in this configuration if the other door is already open or unlock With the Interlock Override feature enabled the card holder does not have to wait for both doors to be closed in order to access a door using the interlock feature When using this option and access is granted the controller will generate an Access Granted Interlock Override event Also refer to Assigning an Interlock Input on page 77 Manufacturing Access Control Since 1985 REFER Selecting Card Status Each card can be tagged with one of five status levels These status levels will determine when a card holder s access card is valid Click the Status drop down list to select one of the following status levels Valid As soon as you click OK the card s programmed access privileges are valid and the card holder can begin using their card until the status is changed Stolen Invalid or Lost These status levels allow you to indefinitely revoke a card s privileges without having to remove it from the database As soon as you click OK the card can no longer be used until the stat
95. ame MOOM A Fle and Porter Shang YM reemer Explorer Java TM 2 Patio Standard Edition binary Display a notification when Windows Firewall blocks a program Ww 2 Eo mea 6 The Windows Firewall window will re appear From the Exceptions tab make sure that the sqlsevr exe check box below the Programs and Services heading is selected 7 Click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configur n DCOM Configuration Go to Start gt Settings gt Control Panel and double click on Administrative Tools C File Edit View Favorites Tools Help Q esk r O Y P search gt Folders xa fae Address G Control Panel S Accessibility Options Adjust your computer settings for vision S Add Hardware Installs and troubleshoots hardware Th Add or Remove Programs Install or remove programs and Windows AS Configure administrative settings for your v Automatic Updates Set up Windows to automatically deliver i Date and Time Set the date time and time zone for you SA Display Change the appearance of your desktop 5AFolder Options Customize the display of files and Folders From here double click on Active Directory Users and Computers My Administrative Tools File Edit view Favorites Tools Help Quad P search Fables Y O Address 3 Administrative Tools SB Active Directory Domains
96. ammed to unlock via schedule between 8AM and 5PM If by 8 15 no one has presented their card to the front door s reader it will not unlock When the first person arrives at 8 30AM and presents a valid card the door will remain unlocked until 5PM Time and Attendance When the Time and Attendance check box is selected the time and attendance from the punch device become available for the ProReport module Setting the Door Timers Under the Timings heading you can set four different door timers as detailed below Unlock Time In the Unlock time text field enter a value between 001 and 999 seconds Default 5 seconds This value represents the amount of time the door will remain unlocked when an Access Granted or Unlock event is generated from the door The door will only remain unlocked for the entire Unlock Time if the Door Input Relock schedule and REX Input Relock schedule are disabled or if no door input has been programmed For more information refer to Door Inputs and Outputs on page 76 Pre alarm Time Before generating an Open Too Long event see Open Too Long on page 74 the controller can be programmed to generate a pre alarm as a warning of the upcoming alarm In the Pre alarm time text field type a value between 001 and 999 seconds Default 45 seconds This value represents the amount of time a door can remain open after an Access Granted or Door Unlock event before generating a Door Left Open event The
97. an output right click the desired output You can also use the Shift or Ctrl keys to select multiple outputs if you wish to modify several outputs in the same manner at once and then right click on any of the selected outputs A drop down list will appear Select one of the actions from the list For more information refer to Displaying and Controlling the Status of an Output on page 169 Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 4 2 Access Control Software e 2 Access Control Systems Chapter 14 Events What Will Find Event Definition OvenviGw seres a ta elds 134 Event Schedules and Device Activation eee eee eee eee e eens 135 Alarm Acknowledgement 0 0 6 ne tte eee 137 E Mail Activation ee eee enn n eee eee eee eee e eee eee 139 Event Activated CCTV Gone A A A A a atlas al ee tte aot aw ae eee 140 Every event that occurs in the system can be programmed to perform a series of actions Schedules can be assigned to each event defining when the event will be displayed on the screen and when it will be saved in the database Select which device i e relay can be activated when it can be activated and the length of activation A schedule defines when an event will require operator acknowledgement while providing the operator with detailed instructions Manufacturing Access Control Since 1985 f REFERENCE MANUAL
98. and Trusts Shortcut E Active Directory Sites and Services 1KB Shortcut oe d Computers 1KB Shortcut cer ification Authority 2KB Shortcut Eg Cluster Administrator 2KB Shortcut E Component Services 2KB Shortcut computer Management 2KB Shortcut Manufacturing Access Control Since 1985 Here right click on Users point to New and choose Group amp Active Directory Users and Computers Z File Action View Window Help Active Directory Users and Computer Saved Queries g testz 3 Builtin 3 Computers 4 Domain Controllers 03 ForeignSecurityPrincipals Delegate Control Find E 8 Administrator CB centaur Ei cert Publishers f Ons dmins OnsUpdateProxy omain Admins omain Computers HET tea InetOrgPerson New Window From Here MSMO Queue Alias rs Refresh Printer Export List User Shared Folder UPPORT_388945a0 elnetClients Properties Help In the New Object Group window type a name in the Name field and click OK New Object Group i e Create in test2 Users Group name Centaur Group Group name pre Windows 2000 Centaur Group Group scope Domain local Global Universal ces Om aan ghra Users 18 objects User Security Group Dome Security Group Dome Security Group Dome Security Group Globe Security Group Globe Security Group Globe Security Group Globe Security Group Globe Security Gro
99. ard Centaur s Card Management feature 97 Programming Rights Security Levels 150 Pro Report 13 18 Protocol CCTV 140 Purging Databases 177 R Reader 72 Reader Disabled Output Activation Events 130 Reader Format Custumization 63 Reader Type 56 Reader Type Door Expansion Module 61 Reader Controllers 55 Reading Device 72 Reading Type Options 73 Real Time Events Status Window 27 Refresh 17 Refresh Centaur s Card Management feature 97 Relay Activation Time 112 Relay Groups Activate or Deactivate 145 also see Groups 144 Assigning Relays to a Relay Group 144 Relay Properties Activation Tab 111 Relay Tab 110 Relay State 113 Relay status 17 Relay Tab 110 Relay Activate with Anti Passback 60 Relays 109 Repeat Sound Every 182 Requires Acknowledgment 137 Reset Anti passback 34 Reset Anti passback Status 60 Reset Anti Passback Scheduled 60 Reset Controller 65 Reset Event s Definition to Default 135 Manufacturing Access Control Since 1985 Response Delay Controller 59 Response Time Inputs 121 Restore Time 127 Restoring Databases 174 REX Denied Output Activation Events 129 REX Granted Output Activation Events 129 REX Input 76 Running the wav Player 182 Running the Database Management Module 172 S Save Changes Centaur s Card Management feature 97 Saving Events to Disk 135 Schedule Activating Relays 112 Alarm Acknowledgement 137 Anti Passback 60 Anti passback Reset 60 CCTV Control 140 Communications 30
100. ase do not use this for reducing the size of the database or purging large numbers of events If the event database is too large then use the Truncate option in the size tab Attach progress Purge Events Start Date Saturday February 02 2008 y EndDate Sunday February 03 2008 Site Y Fansites ces From the Purge Events window use the Start Date and End Date drop down lists to select the period Select the site from the Site drop down list or click the All Sites check box Click OK Centaur will delete events that occurred in the selected site s during the selected period Manufacturing Access Control Since 1985 Database Backup Scheduler Centaur s database backup scheduler enables you to schedule regular backups of the Centaur databases You can back up the Main database and the Event database separately specify the location of the backup files and select how often daily weekly or monthly the backup will occur When the database backup scheduler saves the backup file it will overwrite the previous file If you want to create backup files that do not overwrite each other refer to the document from the c Program Files CDV Americas Centaur Administration Console MSDE Management MSDE_How to create a schedule task doc or contact technical support see Technical Support on page 4 Creating a Scheduled Database Backup Multiple scheduled jobs can be created to save database backup
101. ast z Server computer through the COM port After selecting Direct Serial Port you Schedule Never are required to further set the site properties See Selecting the Site Baud Rate com Part CTL 1 64 COMI y on page 30 Selecting the Site Speed on page 30 Selecting the Site COM Port 2 CTL 65 128 None Y Communication Schedule on page 30 and Assigning COM Ports to Controller COM Port 3 CTL 129 192 None y Addresses on page 30 All other settings will be unavailable COM Port 4 CTL 199 258 ore Phone Number Modem None y Update CTL time automatically every 15 minutes Enable Offline Buffering Outbox Manufacturing Access Control Since 1985 REFERENCE MANUAL Dialup Modem Select this method if this is a remote site that will communicate with the Centaur Server computer through a modem After selecting Dialup Modem you are required to further set the site properties See Selecting the Site Speed on page 30 Selecting the Site Communication Schedule on page 30 Assigning Dial up Site Telephone Number on page 31 and Assigning the Dial up Site Modem Type on page 31 If you do not set these properties you will not be able to exit the Site Properties window All other settings will be unavailable Figure 1 Dial up Site REMOTE SITE CT V900 A Server Modem Modem 2 Door Controller First controller of a site Access Control Systems wn 7 SERVE
102. at Reader 6 0 or higher e XML 3 0 Parser Manufacturing Access Control Since 1985 UY de Li REFERENCE MANUAL 42 1d Using Centaur Controller Requirements e CT V900 A Rev 200 210 220 230 260 require firmware R2 C3 65 or higher e CT V900 A Rev 100 110 require firmware R1 01 79 or higher For more information on how to update the controllers refer to Online Controller Firmware Upgrades on page 63 or Online Help Technical Support For technical support in Canada or the U S call 1 866 610 0102 Monday to Friday from 8 00 a m to 8 00 p m EST For technical support outside Canada and the U S call 00 1 450 682 7945 Monday to Friday from 8 00 a m to 8 00 p m EST Please feel free to visit our website at www cdvi ca Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Installing and Using Centaur E a Installing Updating the Centaur Server This section describes how to install or update the Centaur Server The Centaur Server software must be installed on the computer where all controllers are or will be connected For new installations of the Centaur software or when upgrading to the Centaur 4 2 software from a previous version you need to upgrade the controller firmware version to R2 C3 65 or higher A To install the Centaur 4 2 software on Windows 2000 2003 XP operating systems you must be logged on as Administrator 1 Insert the Centaur 4 2 CD into the computer s CD ROM dri
103. ate End Date 1 30 2008 b I Card Traced J7 Extended Access I Use Keypad TF Antipassback Override JT Interlock Override Carcel _ Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Cards E Modifying a Card From the desired Site branch in the Database Tree View window right click the card you wish to modify and click Properties from the drop down list You can also select the desired card and press the keyboard Enter key Also refer to Centaur Card Management Feature on page 96 Card Holder Details From the Card window select the Card Holder tab This will allow you to view the site address to assign access levels and to program the card holder details card number and card options Also refer to Centaur Card a jr fd Management Feature on page 96 SA Lort Name fiche Use the Last Name First Name Company Name and Notes text fields Fest Name Edwards to identify the card holder s name and any additional notes that may be required All recorded text excluding the Notes field will appear when displaying the Access Events in the Real Time Events Status window see Display Access Events on page 164 Card Number Use the Family Number and Card Number text fields to identify which access card will be assigned to the user Family Number The family number can be found printed directly on the card or written on a cross reference sheet The famil
104. ating that the information has been successfully imported Click OK LS You must close and restart the Centaur administration console for all changes to take effect Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 4 2 Access Control Software e 2 Access Control Systems Chapter 10 Elevator Control What Will Find Overview of Elevator Control a a A A a ii ei 106 Using the Centaur software you can control the access of up to 64 floors per site Each of the CA A480 Elevator Controllers can control up to 16 floors and up to eight elevator controllers can be supported by each controller You can interface the elevator cart s floor buttons with the elevator controllers relays and program them to follow a public access schedule no card required or to limit access to individuals with a valid card Only the floors that have been assigned to the elevator cart s public access schedule or to a floor group assigned to a card will be active Manufacturing Access Control Since 1985 REFERENCE MANUAL Overview of Elevator Control Elevator control allows you to define when certain floors from an elevator cart can be accessed and by whom these can be accessed Each site can control up to 64 floors e Each CA A480 A Elevator Controller controls up to 16 floors Each controller supports up to eight CA A480 A Elevator Controllers Each door
105. atus window Make a Beep on All Access Events When the Make a beep on all Access events check box is selected your computer will beep every time an Access event appears in the Real Time Events Status window Access events consist of any event generated that is linked to the status of the doors in the system such as Access Granted Card Traced and Door Forced Open Make a Beep on All Abnormal Events When the Make a beep on all Abnormal events check box is selected your computer will beep every time an abnormal event appears in the Real Time Events Status window Abnormal events consist of any event generated that is uncommon to normal site operation such as Door Left Open Relay Activated by Operator and any troubles Update events every This option determines at what intervals the Centaur access control software will refresh the Real Time Events Status window From the Update events every drop down list select the desired interval of time Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Options E a Setting the Event Status Refresh Rate This option determines at what intervals the Centaur access control software will refresh the Real Time Events Status window when displaying the status of devices in the system such as doors and controllers For information on displaying the status of devices in the system refer to Manual Controls on page 163 From the Update status d
106. ault Timed E 165535 ms max To reset an event s definition to default right click the desired os ean event from the Events branch in the Database Tree View window and select Reset Settings You can also select the desired event and press the keyboard Delete key Schedule Never Setting the event s definition to default will Always show the event in the Real Time Events Status window see Screen on page 135 Always log the event in the Event database see Disk on page 135 e Disable alarm acknowledgement see Enabling Alarm Acknowledgement on page 137 e Disable CCTV control see Enabling CCTV Control for an Event on page 140 Event Schedules and Device Activation Once an event has been selected as described in Event Definition Overview on page 134 click the General tab in the event s Access granted Properties window to program its general properties Setings tor MEM gt EA pes E Mail CCTV Control oa co Entrance Sereen ts Selecting the Event Schedules RAD Disk always E r Device Activati Under the Schedule heading you can define when the selected C CT event will be displayed in Centaur s Real Time Events Status ime o 65535 ms max window as well as when the event will be logged in the Centaur Ro 7 De database Schedule Never Screen From the Screen drop down list select the schedule that will define when the e
107. aur s FontView clear this feature check box Manufacturing Access Control Since 1985 o REFERENCE MANUAL Figure 12 2 Door Expansion Module s Door Configuration SERVER Deleting a Controller To delete an existing controller right click the desired controller from the Controllers and click Delete You can also click the desired controller and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Controllers za Online Controller Firmware Upgrades With the Centaur software there s no need to change the microchips of each controller Centaur can download the new firmware to some or all of the controllers in your installation in just a few easy steps When updating the controllers the controllers cannot control access or perform any other monitoring functions Therefore we recommend that firmware updates are performed when traffic is at a minimum and advise users of any interruptions that may occur The latest version of the controller firmware can be downloaded from our website at www cdvi ca Please note that the controller firmware consists of two files one with a HXL extension and the other with a HXH extension Also the file name will indicate the version and release number of the firmware Use the View Controller Status command see page 65 to verify the application version currently used by the c
108. aur Administration Console Workstation 7 Installing updating the Administration Console 8 Installing Updating the Centaur Software 5 Instructions 137 Interlock Inputs 77 Interlock Override 93 Invalid Cards 94 Inverted Output 128 IP Address 57 K Keyboard 22 Keypad Schedule 73 Keypad Time out Output Activation Events 129 Keypad Type 56 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 R Keypad Type Door Expansion Module 61 Keypad Controllers 55 L LAN 29 Languages 22 Latched Relay Activation Manually 166 Late to Open Unlock On 73 Launching Centaur 11 Limiting the Event Database s Size 174 Locator 13 18 Lock a Door Group 145 Lock Control 73 Lock Control Entry Exit Doors 61 Lock Door 165 Log Com Failure 59 Log File 17 Logon ID Setting the Operator s Access Rights 152 Lost Cards 94 M Main Database 172 Make a Beep on All Abnormal Events 160 Make a Beep on All Access Events 160 Make a Beep on all Events 160 Mantrap Inputs 77 Manual Control of Door and Relay Groups 145 Manual Controls 163 165 Manual Controls Security Levels 151 Maximum Family Number 34 Menu 17 Modem 31 Modify Security Levels 150 Modifying Access Levels 84 Cards 91 CCTV Commands 156 Controllers 52 Doors 69 Groups 143 Holidays 40 Inputs 119 Outputs 127 Relays 110 Schedules 44 Security Levels Permissions or Operators 149 Modifying a Site 27 Modules 18 Modules Tab see Softwa
109. be listed Assign the desired devices to the group by selecting their associated check box Example In the example below the selected relay group has been assigned relays 3 4 and 5 from controller 1 Figure 33 Example of Programming a Group of Devices Relay Group Properties Relay Group Relays Relay 001 01 Relay 001 02 Relay 001 03 Relay 001 04 Relay 001 05 Deleting a Group From the desired Site branch in the Database Tree View window expand the Groups folder expand the desired group folder Door Groups Floor Groups Input Groups or Relay Groups right click the desired group you wish to delete and click Delete from the drop down list You can also select the desired group and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Groups a Manual Control of Door and Relay Groups The following describe how you can remotely control a group of doors or relays Lock or Unlock a Door Group To lock or unlock all doors in a door group expand the Door Groups folder within the Database Tree View window right click the desired door group and select the desired Lock Door Group or Unlock Door Group command from the drop down list For more information on the available commands refer to Displaying and Controlling the Status of a Door on page 165 Enable or Disable a Door Group
110. ccess to the door when the A ENEE Access Denied Anti passback violation event occurs Clear this check box to grant access to the door when the Access Denied Anti passback I Tracker LCD Display Option violation event occurs Please note that to enable hard passback you must also enable the Anti Passback Selecting the Anti passback Reset Schedule From the Reset Schedule drop down list select the schedule that will reset the anti passback status of all card holders to unknown This reset will occur at the start of every period in the selected schedule For more information on schedules refer to Schedules on page 43 Selecting the Anti passback Reset Input Select the Reset on Input check box and select an input from the Input drop down list Clear the check box to deactivate this feature Selecting the Anti passback Activation Relay From the Activate Relay When Area is Empty drop down list select the relay that will activate whenever there are no longer any cards in the controller labelled as in For example you can use the relay to arm a security system when everyone is out of the building Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Controllers par Setting Lock Control for Entry Exit Doors When doors are set up for Entry and Exit see Selecting a Door Type on page 71 the controller can be programmed to unlock both doors upon valid access Under the Lock Control Entry E
111. ces such as the Intemet We recommend that you click the General tab and select On Programs and Services DCOM File and Printer Sharing Intemet Explorer Java TM 2 Platform Standard Edition binary Microsoft Management Console Remote Assistance O Remote Desktop Skype spxSvr exe salservr exe DI LIPnP Framewnrie Y Display a notification when Windows Firewall blocks a program What are the risks of allowing exceptions 8 Click OK Manufacturing Access Control Since 1985 is REFERENCE MANUAL ENABLING NETWORK ACCESS ON WINDOWS XP In order to be able to setup the DCOM on computers running on Windows XP the network access must be enabled From the taskbar click Start gt Settings gt Control Panel P Control Panel i f le De tit yem Fevontes Joue pep i Gr OF Quen rm gt Aydrews Be Control Pare po a Y gt T adobe Gomera Aytematie Date and Time Updates E Woeddrs Locate Q Neb md Support Windows Wireless Frewel Network Set 1 Double click Administrative Tools 2 Double click Local Security Policy Manufacturing Access Control Since 1985 m a REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration Administrative Tools File Edit View Favorites Tools Help Qu I JO seach Py Folders E Address Wig Administrative Tools File and Folder Tasks mj Rename this file 3 Move this file A Copy this file la JLocal Security Policy
112. cess Control Since 1985 Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 4 2 Access Control Software SS Access Control Systems Chapter 21 Centaur Wave Player What Will Find Starting Centaur Wave Player 182 Assigninga WAV File zey airaa E A gaan alg ns BAe aie ee Pisa a adel A A ee Roa cance aoa uch vagy Ses 182 This utility was designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs The sound can replay at programmed intervals until the alarm is acknowledged Manufacturing Access Control Since 1985 A PJ REFERENCE MANUAL Centaur Wave Player This utility was designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs see Alarm Acknowledgement on page 137 The sound can replay at programmed intervals until the alarm is acknowledged Starting Centaur Wave Player 1 Make sure that Centaur is running Click Start Programs CDV Americas Centaur Administration Console and click WavePlayer 2 From the Wave Player Login window type the appropriate Login ID and Password Centaur Wave player uses the same Login ID and Password as Centaur If you are trying to log in to a Centaur Server that is on a network type the computer s network name or IP address in the Computer text field 3 Click OK Assigning a WAV File When an event that requires acknowledgemen
113. chedule i I Door 01 01 For information on how to create doors see Doors on page 67 For information on I Door 001 02 how to create schedules see Schedules on page 43 For information on how to assign an access level to a card see Cards on page 87 Assigning Doors and Schedules to an Access Level Perform the following to define the access level 1 Select the Doors and Schedules tab A list of all doors that have been created in the site will appear with a check box on the left of each one 2 To assign a door to the access level select the check box associated with the desired door A Schedule drop down list will become active 3 From the Schedule drop down list select the schedule you would like to assign to the selected door 4 Repeat steps step 2 3 to assign another door and schedule or click OK to save and exit Example In Figure 17 the Back Door is enabled and has been assigned the General schedule This means any card holder assigned with this access level will be granted access to the back door only when the General schedule is valid Figure 17 Example of Access Level Programming Schedule Back Door General I Front Door Manufacturing Access Control Since 1985 Deleting an Access Level In the Database Tree View window left hand portion of your screen right click the desired access level and click Delete from the drop down list You can also select the desired access
114. co era Schecddes Cartraler 001 11 JOA 2008 244 30 Pet 11fOy20O8 244 30 404 E tsn reri Updated teler roge Cortralles 001 ZOO 7 ee 30 T2000 2 44 90 Real Time 0 Sedes nearer ey romp T non Events Status O controis Contras Coriri 00t 110063008 Dee 30 PN Window 0 Cortrales 001 0 corte 002 gt Contras Cortrofew 001 LLASAG 7 40 05 PH TONTA teta La niskie Corti yi x POM Ons EIEI TANI 2 41 49 Smurt Loves Qipti Corre 100 1140242008 74308 pre PONDI 27 43 46 OE Database cases targi Dpat lmay Cortile 004 LOIS P4345 PH nouma 2 01 Tree View Q emas gt window Petratore Pati Tome Alarm Window Status Bar Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Understanding the Centaur User Interface gt Menu The menu gives access to the File View Options Modules and Help menus e The File menu gives access to the Exit sub menu allowing to close the Centaur Administration Console application The View menu gives access to the following Toolbar Allows to show or hide the Toolbar Status Bar Allows to show or hide the Status Bar e Refresh Allows to refresh the Tree View and the Status windows The following submenus allow to select what events will be displayed in the Events Status window The following selections are also available from the Toolbar see Toolbar on page 19 All events Refer to Display All Events on page 164 for more information e Access
115. ctively in the User Defined Data tab of a selected card E Hexadecinal Card Numbers 26 Bis 6 Oigts Unique PIN Numbers I Dintitated Card Progamming The text you type in the T F1 and T F2 text fields will appear next to the two IF Exienchad Accosa Loves A check boxes respectively in the User Defined Data tab of a selected card e The text you type in the Date 1 and Date 2 text fields will appear next to the pame ri Z two date fields respectively in the User Defined Data tab of a selected reset schedule News z card Example The Figure 5 shows the results of the defined User Definable Card Fields on the FrontCard window Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Sites FW Figure 5 User Definable Card Fields Site Properties s FrontCard Site Site 1 E x eee a IICA Palaa Daed HeedOn gt Ose embate gt E Cadlici n 0 Vow Deined Data ON Preto a Badoo TEN Fate e 12 Dys gt EE pj rez fasses e HeedOn Febrasy 14 2008 lt Check cyt Teta 2p oF BithDate Fetnamp 14 2008 y D heek Prone Num gt Tete Tie Noe gt j T Hexadecinal Card Numbers 26 Ots 6 Diges F Unique PIN Numbers I Distriiated Card Progamming 7 Extended Access Levels Levels 1 4 Hexadecimal Card Numbers When the Hexadecimal Card Numbers check box is selected the card numbers is entered using the hexadecimal format When this check box
116. d or Access Denied event every time the card is used To enable this feature select the Card Traced check box You can use Centaur s report generation feature to generate a report of all the Card Traced events The Card Traced event can also be used to activate a device such as a relay The relay can be connected to a signalling device warning the operator that a card with the Card Traced feature enabled has been presented to a reader For more information refer to Events on page 133 Extended Access When a card holder is granted access to a door the door will remain unlocked for the period defined by the door s Unlock Time see page 74 When the Extended Access check box is selected the door will remain unlocked for the duration of the door s Extended Access see page 75 in addition to its Unlock Time This option is particularly useful for individuals that may require more time to access the door Example A card holder is granted access to the front door with an Unlock Time of 15 seconds and an Extended Access time of 30 seconds If the option is enabled the door will remain unlocked for 45 seconds instead of only 15 seconds Use Keypad This option is used when a card holder presents their card to a reader that is accompanied by a keypad on the same side of the door If the Use Keypad check box is selected the card holder will have to enter a P I N see page 93 on the keypad after presenting their card to the re
117. d site branch in the Database Tree View window Appropriate operator permissions and security levels must be enabled see Operators on page 147 Display All Events When you click on the All events icon the last 1000 events that occurred in the selected site will appear along with its j details in the Real Time Events Status window Display Access Events When you click on the Access events icon any of the last 1000 events generated that is linked to the status of the doors in 1E the selected site i e Access Granted Card Traced etc will appear along with its details i e company name and information about the user in the Real Time Events Status window Display Abnormal Events When you click on the Abnormal events icon any of the last 1000 events generated that is uncommon to normal site j operation i e Door Left Open Relay Activated by Operator troubles etc will appear along with its details in the Real Time Events Status window Display Acknowledged Events Acknowledgement on page 137 When you click on the Acknowledged events icon any event that requires acknowledgement and has been acknowledged by an operator will appear along with its details in the Real Time Events Status window 1 Any of the last 1000 events in the site can be programmed to require operator acknowledgement see Alarm Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Manual Con
118. ddress as well as record the site name and any additional notes site Comms Cards Floors CCTV CMPP Changing the Site Name Site 2 Site Manufacturing Plant Montre Use the Site text field to identify the site location We recommend using a name that is representative of the site such as Manufacturing Plant Montreal Also refer to pu Typing Names and Notes on page 22 Typing the Site Notes Use the Notes text field to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 22 Site Communication Settings Select the Comms Communications tab from the Site Properties window Each site can be connected either locally remotely or through a TCP IP connection When a site is communicating online with the Centaur Server computer you will not be able to modify the site communication settings This is to prevent any accidental disconnection from the Centaur Server computer Selecting the Site Communication Type Site Properties From the Type drop down list select the method of communication between the site Site Comms Cards Floors CCTV CMPP controllers and the Centaur Server computer Use one of the following three methods Type y Direct Serial Port Baud Rate fso y Select this method if this is a local site that will communicate with the Centaur Speed F
119. delete entire database files Manufacturing Access Control Since 1985 APR REFERENCE MANUAL What are the Centaur Databases Before starting you need to understand how the Centaur databases are used and what information is saved in them These databases are attached to the SQL Server application used by Centaur Whenever something is programmed or an event occurs in the system the information is downloaded to the SQL Server and saved in the Main and or Event databases These files are saved on your hard drive in the following default path C Program Files CDV Americas Centaur Centaur Server Data Only databases currently used by SQL and Centaur will be saved in the above mentioned directory path The backup files can be saved wherever you wish Main Database The Main database CentaurMain contains all the system characteristics of the Centaur software i e sites controllers schedules cards etc The more sites cards and controllers you have programmed the bigger this file will be Event Database The Event database CentaurEvents contains all events that have occurred in the system i e Access Granted Door Forced alarms etc For more information on how you can manage the size of the Event database please refer to Limiting the Event Database s Size on page 174 Also refer to Disk on page 135 Database Management Module The Centaur Database Management Module is automatically installed with Ce
120. demonstrated by the colour of the site Direct Dial Up or TCP IP icon in the Database Tree View window and the colour of the message in the status bar COMMUNICATION COLOUR ICON TREE VIEW WINDOW STATUS STATUS INDICATOR Disconnected Communication i Yellow Failure Connected If you wish to connect to a site for continuous communication select the Always schedule in the Comms tab of the Site Properties window Refer to Selecting the Site Communication Schedule on page 30 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Control Software Access Control Systems Chapter 4 Holidays What Will Find Adding a Holiday cic ee sees il ae bes a ae betes het ahh acu aden ee eater ee eek ea eee Ellie Reece cre ee 40 MOGITV ind Holiday ssis atacara cee cracls Berk nl iair dice a sa aceon tects tee aria eect EE E ai wastes fa efor ces 40 Deleting a Holiday i o 5 iid wetted dk RE ded ot ede eed eee ear ee died ted dd geese oi eed 41 Use holidays to define which days in a specific schedule or period are valid or invalid Once created you can assign the holiday to one or more holiday groups Manufacturing Access Control Since 1985 Adding a Holiday Right click Holidays in the desired Site branch and click New Holiday You can also click Holidays and press the keyboard Insert key to add a new holiday After adding a holiday the Holiday Properties window will appear allowing
121. ders and or keypads connected to the 2 Door Expansion Door Expander s Configuration Door expander 2 Modules In the Expander tab each Reader and Keypad drop down list is Reader 1 Standard 266 Keypad 1 None E associated with a predetermined input on a specific 2 Door Expansion Reader 2 Standard 26Bit v Keypad 2 None Y Module which is determined by its DIP switch settingsas shown in Figure T Poll Door Expander Status Non Stop Front View 12 on page 62 r Door expander 3 Reader Reader 1 Standard 26Bit y Keypad 1 None From the Reader drop down list select the type of reader used If no Reader 2 Standard 26Bt v Keypad 2 None Y reader is being used on the selected door input select None J Poll Door Expander Status Non Stop Front View Keypad From the Keypad drop down list select the type of keypad used If the door is not using a keypad select None When both a reader and a keypad are used only card holders with the Use Keypad option enabled see Use Keypad on page 93 have to use both to gain access Poll Door Expander Status Non Stop By enabling the Poll Door Expander Status Non Stop Front View check box Centaur will poll the selected 2 Door Expansion Module every time it polls the controller Select this feature when using Centaur s FrontView If it is not selected Centaur s FrontView might display the 2 Door Expansion module as offline If you are not using Cent
122. drate Data Bits Parity Stop Bits and Flow Control lists Selecting a card enrolment unit Baudrate In the Baudrate list select a baud rate that is compatible with the card enrolment unit connected to the selected COM port Setting the COM Port Communication Parameters Select the required data bits parity stop bits and flow control settings to communicate with the card enrolment unit connected to the selected COM port Set the following parameters as required Data Bits From the Data Bits drop down list select the number of data bits required to communicate with the card enrolment unit connected to the selected COM port This value is the number of bits used to represent one character of data Most forms of data require eight bits Parity From the Parity drop down list select a parity value that is required to communicate with the card enrolment unit connected to the selected COM port Parity check is an error detection technique that tests the integrity of digital data within the computer system or over a network Each time a byte is transferred or transmitted the parity bit is tested Stop Bits From the Stop Bits drop down list select the number of stop bits required to communicate with the card enrolment unit connected to the selected COM port The stop bit is transmitted after each character Flow Control From the Flow Control drop down list select the flow control type required to communicate with the card enrolment uni
123. e pp giry A o COM Port 1 CTL 1 64 COM 1 y COM Port 2 CTL 65 128 None y Dialup Settings e hen COM Port 3 CTL 129 192 None z Phone Number Mod COM Port 4 CTL 193 256 None y Modern None In the Site Name text field type the desired site name We recommend using a name a that is representative of the site such as Manufacturing Plant Montreal From the Communication Type drop down list select the desired connection method For more detailed information on the available types refer to Selecting the Site Communication Type on page 27 The site configuration wizard is dynamic therefore only options corresponding to the selected communication type will be available Other options will be unavailable Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Sites 3 Set the remaining available options as required and click Next For more information Controller amp Door Setup th ti ns which Please enter the number of Controllers you would like to add to the Site Apply default settings to all controllers ee ie Bald ete Bhoi Number of Controllers Individually setup each controller Number Modem and Serial reece A Resear Settings COM Port y _ _ jos Assignment refer to Site ae tae AA ees ee fa ad nnn N Ape Communication Settings on das Ae E Input Config nc Inputs y Reader Type Standard 26 Bit Num Doors 1002
124. e a value between 000 and 999 seconds Default 5 seconds This value represents the amount of time the relay will remain activated when enabled by a timed activation schedule see Selecting a Time Relay Activation Schedule on page 111 or when activated manually see Displaying and Controlling the Status of a Relay on page 166 Setting the Relay Delay Time Before Activation In the Delay time before activation text field under the Timings heading type a value between 0 and 999 seconds Default O second This value represents the amount of time the controller will wait before activating the relay upon a valid time activation schedule or when activated manually see Displaying and Controlling the Status of a Relay on page 166 Example A Delay time before activation of 30 seconds has been programmed in the example shown in Figure 23 on page 112 If period 1 of the schedule becomes valid the relay would activate 30 seconds after 8 00AM Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Relays a Setting the Relay s Non Activated State From the Non activated state drop down list select the appropriate normal state De energized The relay output is energized when activated This means the selected relay output on the controller will remain de energized until activated by a schedule or manually see Displaying and Controlling the Status of a Relay on page 166 When activated the c
125. e access level The first access level created is assigned Access Level 3 as its address Every time an access level is added Centaur increments the access levels address by one Addresses 1 and 2 are reserved for the All and None access levels Enabling the Access Level Select the Active check box to enable the access level allowing you to assign the access level as required Clear the Active check box to disable the access level without having to remove it from the database this will disable any card assigned with this access level Typing the Access Level Name In the Name text field type a descriptive name for the access level e g Management Also refer to Typing Names and Notes on page 22 Typing the Access Level Notes Record any important explanations regarding the access level and its use Use the Notes text field to keep a record of how an access level was changed and when it was changed Also refer to Typing Names and Notes on page 22 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Levels Access Level Doors and Schedules Access levels determine which doors in the system a card holder will have access to and during which periods This is done by enabling the desired doors in an Access Level Properties access level then assigning a schedule to each selected door and assigning the Access Level Doors and Schedules access level to the desired cards Door S
126. e desired Site and click New Schedule from the drop down list You can also click Schedules in the desired Site and press the keyboard Insert key After adding a schedule the Schedule Properties window will appear allowing you to configure the schedule see General Schedule Properties on page 45 Modifying a Schedule From the desired Site in the Database Tree View window right click the desired schedule from the Schedules and click Properties You can also click the desired schedule and press the keyboard Enter key You cannot modify the default Always and Never schedules Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Schedules gt w General Schedule Properties From the Schedule Properties window select the Schedule tab This will allow you to view some of the system component addresses as well as record the schedule name and any additional notes Schedule Properties Schedule Details Site 2 Schedule 5 M Active Enabling the Schedule Name gt Select the Active check box to enable the schedule allowing you to ee assign the schedule as required Clear the Active check box to disable the i 5 schedule without having to remove it from the database this will disable any system device or card assigned to this schedule Typing the Schedule Name Use the Name text field in the Schedule tab to identify the schedule We recommend using a name that is representative of the schedule
127. e holiday group is Holiday Detais assigned to a schedule s period see Schedule Periods on page 45 If you do not assign a holiday to a holiday group schedules are invalid access denied on that Da il day Month January y Holiday group allows to group several holidays in one type E z J Holiday Group 1 Example Christmas New Year s Day and Labour Day are all days where the site aliens TF Holiday Group 3 is closed and card holders are denied access all day These can be grouped as Pe Holiday Group 1 Half days such as Christmas Eve and New Year s Eve would be grouped as Holiday Group 2 Religious days would be grouped as Holiday Group 3 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Holidays e Creating a Holiday and Assigning it to a Holiday Group Perform the following to define the day month and year of the desired holiday 1 2 From the Holiday Properties window select the Details tab From the Day drop down list select a day from 1 to 31 From the Month drop down list select a month from January to December From the Year drop down list select the desired year If it is a holiday that occurs on the same month and day every year e g New Year s Day select the Every Year option from the drop down list If required assign the holiday to the desired holiday group s by selecting the appropriate check box es Click OK Deleting a Holiday T
128. e lost 1 After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SpxDBase Centaur Database Utility Backup Size Advanced window will appear 7 SPXDBase Centaur Database Utility Backup Make a backup of the current Centaur databases as selected below 2 From this window select the Backup tab Restore Restore previously made backups of the current Centaur databases as selected below Please close the Centaur server before restoring 3 Select the databases you wish to restore by clicking the Main Database Backup Path Main Database and or the Event Database check boxes Je main bak an M Main Database For more information refer to What are the Centaur Evert Daba Becton rahe Databases on page 172 eevemtbak a Event Database NOTE Spaces are not supported in the path or in the file names 4 Inthe text field corresponding to the selected database s type the full path and the name of the file from which you want to restore the database You can also click the button to browse for the desired file 5 Click the Restore button Limiting the Event Database s Size With this feature you can define the maximum size of the Event database This feature will not affect the Main database only the Event database see What are the Centaur Databases on page 172 When the Event database has reached its maximum size each subsequent event
129. e of the database or purging large numbers of events If the event database is too large then use the Truncate option in the size tab Attach progress E REFERENCE MANUAL Detaching Databases This feature is for advanced users only and should not be used frequently Before attaching a database see Attaching Databases on page 175 you must tell the SQL Server application used by Centaur to stop using the current databases by detaching them Detaching the database will allow you to keep a manual backup of the current databases If you perform a detachment the databases will be detached from SQL but will still exist You must move them from the current path C Program Files CDV Americas Centaur Centaur Server Data to another path Perform the following to detach the database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SpxDBase Centaur Database Utility window will appear 2 From this window select the Advanced tab 3 Click the Detach button Removing Databases If you remove the databases it will detach the database and delete it completely You will not be able to restore or re attach databases that have been removed Perform the following to remove the database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SpxDBase Centaur Database Utility
130. ecseeeeaeeceeeeaeeeaeeeeseesaeesaeesaeeeaeessaeseaeeeaeessaeseaeesaeseaeeseaeseaeesaeenaeenaees 11 Software WO GUNS assirian e eA Cod eck secu eop er aa ap a EEEE AE EEEE 13 UNDERSTANDING THE CENTAUR USER INTERFACE ccsccsseeseseeeseeseeneeseeseeeeeeneasaneneeeaeeesnseesseessaeenseasseaeaseesseasseneaseasaeeeseeneas 15 User Interface OVeNView cui A A e ee A a A Gee 16 Typing Names and Notes 0 ecceceesceceseceeceeneeseeeeeeeeaeeeeaeeeaeesseeseaeesaeesaeessaessaeesaeeseaeessaessaeesaeesaaeseaeeeseeseaeeeaeeseaeseeessaeeeeaeeaeeeaes 22 UTES A a 23 Adding A SIS ic A A A A a aldo 24 ModityiNgia Sie sisi ninaa eanan e aeea eae E itae ea Ea ainia E a boapedys chatus ids a Eear re a aar ea aa eaa a OEE 27 Deleting USO E EE E E EE d 38 Communicating With amp Site c omccnnnnicinnnnnnninnnnnnnnnncnrr 38 HOLIDAYS isis EEE E E E 39 AGING ke Dalel Ne f a a E E E E E 40 Modifying a Holiday cocinar a e a ead E ea ieee 40 Deleting a Holiday e E TE E T 41 S1e a00 E e E 43 Adding a Schedule viii scolds EA e AA E E EO EE Ae E aa dator aaaea a manele en 44 Modifyingia Sehedule s bse sis cadectsach sisatasecanpecestedcosndutie ic vesccasdcnyecesscdeseoaudesuenhanseesaasd pneu A aae a a Eain aT REE Eaa Eaa aeaa e teiaa e ia 44 Deleting a Schedule oo cee eee eeeeceecesseeseaeeeseeteaeeeaeessaeseaeeeaeeeeaeesaaecaeecaeesaeessaeseaeesaaeceaeseaesesaeesseeseaeeeaeeseaeeeaeessaeeeaeesneeseaeeteaeseaeene 47 CONTROLLERS A A 49 Adding Cont
131. ect the check box es associated with the desired software module s I FrontGuard Visual Athentiication to enable the operator to use the selected software module s co ond FT WavePlayer Event Driven Sounds Player I Pro Report Report Generation 9 Click OK I Tracker Time amp Attendance I FrontView Real Time Graphic I Centaur Service Manager FrontCard Centaur s card management feature provides an easy to use interface to program the card properties without having to deal with long card lists in the Database Tree View window and includes an advanced search engine For more information refer to Centaur Card Import Export Feature on page 102 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Operators i Card Import Export Centaur s card import export feature server only enables you to export Centaur card data to a csv file or import a csv file containing card data into Centaur s card database For more information refer to Centaur Card Import Export Feature on page 102 Database Management Centaur s database file management feature server only allows you to control and manage the often large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and delete entire database files For more information refer to Database Management
132. edge the event and provide details Front Door I Start Headcount concerning the event To program an event s alarm a acknowledgement properties Access granted Requires acknowledgement Instructions 1 Select the desired event as described in Event Definition Overview on page 134 2 Select the Alarms tab 3 Enable the alarm acknowledgement by selecting the Requires acknowledgement check box For more information refer to Enabling Alarm Acknowledgement on page 137 4 Inthe Schedule drop down list select the desired schedule For more information refer to Selecting the Alarm Acknowledgement Schedule on page 137 5 Type the desired warnings and details that the operator will see on the screen into the Instructions text field For more information refer to Typing the Instructions for the Selected Alarm on page 137 Enabling Alarm Acknowledgement Select the Requires acknowledgement check box to enable the Alarm Acknowledgement feature If the check box is cleared the feature will be disabled and the Schedule drop down list and the Instructions text field will be unavailable If this feature is enabled you can also use Centaur Wave Player see page 181 to program Centaur to play a sound every time the selected event occurs Selecting the Alarm Acknowledgement Schedule Select a schedule from the Schedule drop down list The event will only appear in the Alarm window when the
133. eeseeeseaeeseaeseaeesieeseaeeeneete 140 AAPP Az zz 141 What Are Groups Pidal cn a amend esugueessadsaeus hus pasta cnacPesetevhcassedensatetatadabacteas 142 Aolo lo ERETTO o MAE E E a e a LAGE Ma baba E 142 MOGI VIG Groupee A o a A RE EA 143 Deleting AOL E E A ES A cree doi E A E 144 Manual Control of Door and Relay Groups iii cidad 145 OPERATOBS ETT A A aia 147 Overview Of OperatOrs comcocicinccnnconicinncnn nana 148 Adding a Security Level Permission or Operator cccceececsceeeeeeeeeeceeeeeeeeceneeseeeeaeesaeeseaeeeaeeseaeseaeeceaeseaeseaeescaeenaeeeneeeeeeseeeeeaees 148 Modifying a Security Level Permission or Operator ccceecceeeceeeeeeeeeeeeeeeeaeeeaeeceeeeeaeeeeeeeeaeesaeeeaeesaesaeeseeeseaeeseaeseaeesieeeeaeeeneeees 149 Deleting a Security Level Permission or Operator ecccecceeeseeeeeeeeeeeeeeeeeeeeceeeeeaeecaeeeaeeeseeeeaeeeeeeseaeeeeeseeeseaeeseaeseaeesieeeeaeeeeneee 154 COTV COMMANDS oo icceisseczccccctceccaccecacescedecccctace snes scedceseeceersncneaneenscesececsaceasnecsnacesnasscuuesteesctgecs cucessceesaceeadessececuuessantessesctenducessanececaie 155 Adding a CO V Command ii 156 Modifying a CCTV Command ratico a di iia 156 Deleting a GCTV Command seismisten ea E RE E E E E a E A TEE a 157 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Control Software OPTIONS oi iia 159 General Centaur Options ci ae iia CaNT EAEE 160 Event Colour Definitions ocios
134. em w Se vices loca Shadow Co Application Manufacturing Access Control Since 1985 Reparing DCOM Perform the following steps to repair your DCOM configuration From the taskbar click Start gt Run The Run window will appear Enter cmd in the text box and click OK OS 8 2x Type the name of a program folder document or Internet resource and Windows will open it For you Open cmd Cancel Browse 1 The C WINDOWS System32 cmd exe window will appear Type cd systemroot system32 and press the keyboard Enter key Type msdtc uninstall and press the keyboard Enter key ca Select C WINDOWS system32 cmd exe Microsoft Windows XP Version 5 1 2666 lt C gt Copyright 1985 2661 Microsoft Corp C Documents and Settings Technical Support gt ed ys stemrootz system32 C WINDOWS system32 gt msdtc unistall 2 Reboot your computer From the taskbar click Start gt Run The Run window will appear Enter cmd in the text box and click OK A 2x Type the name of a program Folder document or Internet resource and Windows will open it For you Open cmd Cancel Browse The C WINDOWS System32 cmd exe window will appear Type cd systemroot system32 and press the keyboard Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration moa Enter key Type msdtc install and press the keyboard Enter key ca Select C WI
135. eport Report Generation Centaurs Report Generation feature provides a user friendly wizard for generating system and Time and Attendance reports Generate quick one time pre defined and scheduled reports for up to 8 different report types You can also search group and sort your reports For more information refer to Centaur s Report Generation Software Operator s Manual FrontView Real Time Graphic Centaur s real time graphic interface gives you point and click control over doors relays inputs outputs and controllers through a graphical floor plan For more information refer to Centaur s Real Time Graphic Interface Online Help Centaur Service Manager The Centaur Service Manager allows operators to start and access the Centaur Access Control System A valid operator login ID and password are required to start Centaur For more information on how to use the Centaur Service Manager refer to Starting the Centaur Server and Software on page 11 Manufacturing Access Control Since 1985 Diagnostic Tool Centaur s new Diagnostic Tool allows you to view your system information to ensure all of the components required to run the Centaur software have been installed Within the Diagnostic Tool s menu you may save or copy your system information to a specific folder on your computer or send it directly to our technical support team in the event that you require assistance This tool is also helpful in assessing which prereq
136. epresentative of the CCTV Command such as Cam1 Vid3 Also refer to Typing Names and Notes on page 22 Typing a CCTV Command s Notes Use the Notes text field in the General tab to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 22 CCTV Command Settings A CCTV Command and its programmed settings are assigned to one or more system event refer to Selecting the CCTV Command for an Event on page 140 and when that event occurs within its assigned schedule refer to Selecting the CCTV Control Schedule for an Event on page 140 Centaur sends the assigned command to the video switcher connected to the COM port selected in the site properties refer to Selecting a Computer COM Port for CCTV on page 36 Manufacturing Access Control Since 1985 Defining a CCTV Command Perform the following to program a CCTV Command s settings 1 2 From the CCTV Command Properties window select the Details tab If you want to use the preset CCTV commands offered by Centaur follow step 3 to step 6 If you want to send a CCTV command that is not offered by Centaur select the Custom Command check box type the desired command in the text field below the check box and go to step 6 When you select the Custom Command check box all other options are disabled From the Select Pr
137. es of the Standard Edition in addition you can e Connect to your site via TCP IP direct or dial up Create up to 8196 cards per site Create up to 64 controllers per site Create up to 512 doors per site e Create up to128 elevator carts per site Enterprise Edition This edition includes all features of the Professional Edition in addition you can Create up to 16 384 cards per site e Create up to 256 controllers per site Create up to 2048 doors per site Create up to 512 Elevator carts per site Demo Mode All editions will run in Demo Mode when a hardlock key is not detected Communication is disabled when in Demo Mode Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Installing and Using Centaur E a Installation Overview This section details how to install the Centaur software including the Centaur Server and Administration Console Workstation available on the Centaur 4 2 CD Each edition of the Centaur software Lite Standard Professional and Enterprise has two different applications the Server and the Administration Console Workstation Please note that the terms Administration Console and Workstation both refer to the same software User Interface and are used interchangeably Centaur Server The Centaur Server manages the controllers and maintains the access control system s databases The Centaur 4 2 CD includes the Centaur Server the Administration Cons
138. eseaeeseesaaeesaeesaeseaeesaeseaeesieeseaeeseeeeeaees 106 PREV SS cece ces E ca bad aed ceca nccainet poem osismastesaacscesucnetas sa Sas sanydas sdoy aaasaaedenaceseds garcons E A 109 Adding RELAYS cui iodo ida 110 Mod NOA Relay ida ado 110 Deleting Relay iii A Seea raar EEPE ieSe EEES ERE 113 Display Relay Status and Manual Controls ooooocccinnocnccnccnnoccnnncnnonn conan conc conan crac nen ranma cnn 113 INPUTS cio A a ia 115 Connecting Input iii da 116 Adding Inputs siii aia 119 Moditying an Input ea oa 119 Deleting am APU nesretna A A A AAA eee 124 AAPP A AA 125 Overview of Output Programming cecceceeeeeeeeeeeeeneeseeeeeeeesseeeeaeeeaeeceaeeeeeecaeeseeeaeessaeseaeeeaeeseeeseaeeseesaeesaeescaeeeeeeneeseieeseeeenaees 126 Adding QUIPUTS vtr o a nen betas da wean pee ents A e dat 127 Moditying an Outpt crasas 127 Deleting AN Output ii liado darlo do O ESE aSa cad 131 Display Output Status and Manual Controls oooonccnncinncconccnnccnnncnnncnnn non nnrn narrar nenes 131 EVENTS ni asian 133 Event Definition OVervieWe atestado 134 Event Schedules and Device Activation sssrin ran e iiei eias aiis idia ia enida Seaia 135 Alarm Acknowledgement ceeceeececeeeeeeeeeeeeeeaeeeeeeeeaeeseeeeaeesaeeeeaeeaeeceaeenaeessaeeeaeeeaeeseaeesaeesaeeseeeseaeesaeeseaeeeaeescaeseaeeseeeeeeeeeeeeeaees 137 Event Activated CCTV Control o cecceeecesecceeeeeeeeeeeneeseeeeeaeeseaeeeaeeseaeeeaeeseeeeaeesaeeeaeesaeeeaeesaeeseaseeesaeee
139. eset drop down list select one of the video switcher s preset definitions to be activated when the selected event occurs When you select a preset definition the radio buttons under the Tilt Pan and Zoom headings are unavailable If you do not want to use a preset definition select None and use the radio buttons under the Tilt Pan and Zoom headings to select the tilt pan and zoom commands you wish to send to the video switcher s camera selected in the next step REFERENCE MANUAL CENTAUR 4 2 CCTV Commands Pp CCTV Command Properties General Details Select Preset METE y Select Camera 001 F Select Monitor om y Tilt pPan Zoom None None None C Up C Left Cin C Down C Right C Dut J Custom Command m From the Select Camera drop down list select which camera will be activated when the selected event occurs From the Select Monitor drop down list select which monitor will be activated when the selected event occurs Click OK Deleting a CCTV Command Right click the desired CCTV Command from the CCTV Commands branch in the Database Tree View window and select Delete from the drop down list You can also select the desired CCTV Command from the CCTV Commands branch in the Database Tree View window and press the keyboard Delete key A dialogue box appears requesting confirmation Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 i REFE
140. ess Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Control Software SS Access Control Systems Chapter 2 Understanding the Centaur User Interface What Will Find Wserinten ace OQveniew iii a epee Benes i Sack whe ta oie nano a a Bole ccna ii ata 16 WGI zest a A A faa Sue ledge a facades RN SA 17 TOODA tios eb ars il dd BA Sahl tr ia ad beheld di debra tnd denied tenet 19 Database Tree View Window 21 Real Time Events Status Window li dw Se Ba Lok habs win ate alesede saree Se dae EE a G4 a oe Eaten 21 Alatins WINDOW ii tie 21 Status Bars atea a Eta anced ta ra ada da 22 Typing Names and Notes cesos cir dura dared eee A A be A Pa eed ie Se eee D E 22 EMGUAGES eves esate scien ieee ees id a ae Sh ane eos ee a 22 The following chapter presents the structure of the Administration Console main window including the different windows menus and buttons Manufacturing Access Control Since 1985 xa REFERENCE MANUAL ing the Centaur User Interface User Interface Overview The following picture demonstrates the Centaur User Interface structure 2 Menu De pee Cotes pasu tee RIE ie BY O4 kja Jowi SCCVABHBSE Toolbar s is Cad ate Due gt gt Bai Contras 001 2200 TAPODI008 244 30 Fat o Contre 001 11 03 2008 1 04 30 Pen E us die tord o eae i oreralas 02 11020200 o ONTO o NA ret Gons Controle 001 LLAGICID0S 2 4430 PM 1140X2008 2 04 30 49 Bi s
141. estrictions in Security Descriptor Definition Language SDDL syntax if the security descriptor is left blank after defining the policy setting in the template the policy setting will not be enforced rs o 13 The Access Permission window will appear Beneath the Group or user names heading select the desired users who will be granted access to the Centaur Server computer through DCOM and click Add Manufacturing Access Control Since 1985 P REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration moa Access Permission 14 Beneath the Centaur Group heading ensure all Allow check boxes are selected 15 Click OK Manufacturing Access Control Since 1985 A PF REFERENCE MANUAL DCOM Configuration for Windows 2003 Server To be able to configure the DCOM on Windows 2003 operating system you have to be logged in as Administrator Verifying DCOM Before going on with the DCOM configuration you can perform the following steps to verify the integrity of your DCOM From the taskbar click Start gt Run The Run window will appear Enter dcomcnfg exe in the text box and click OK Type the name of a program Folder document or Internet resource and Windows will open it For you Cancel Browse The Component Services window will appear Within the Console Root folder left side of your screen expand the Component Services branch the Computers branch and the My Comp
142. events Refer to Display Access Events on page 164 for more information Abnormal events Refer to Display Abnormal Events on page 164 for more information Acknowledged events Refer to Display Acknowledged Events on page 164 for more information The following submenus allow to select what devices will be displayed in the Events Status window The following selections are also available from the Toolbar see Toolbar on page 19 Door status Refer to Displaying and Controlling the Status of a Door on page 165 for more information e Relay status Refer to Displaying and Controlling the Status of a Relay on page 166 for more information Controller status Refer to Displaying Controller Status on page 167 for more information Input status Refer to Displaying and Controlling the Status of an Input on page 168 for more information e Output status Refer to Displaying and Controlling the Status of an Output on page 169 for more information The Options menu gives access to the following e Options Refer to General Centaur Options on page 160 for more information e Events Colours Refer to Event Colour Definitions on page 161 for more information e Operator Timeout Refer to Operator Timeout on page 162 for more information e Log File Refer to Log File on page 162 for more information Manufacturing Access Control Since 1985 a 7 REFER
143. ext field type the full path location where you would like to save the backup and the desired file name You can also click the button to browse for the desired path and or file Click Next Select Create a scheduled job to be performed periodically A text field will appear indicating the current schedule Click the Change button to change the schedule and click OK After changing the schedule and click Next Click Finish Editing a Scheduled Database Backup You cannot edit a scheduled job If you need to change the scheduled job s settings you must delete the existing job see Deleting a Scheduled Database Backup on page 179 and then re create a new one see Creating a Scheduled Database Backup on page 178 Deleting a Scheduled Database Backup Perform the following to delete a scheduled job 1 2 Make sure the SQL Server is running see Starting the Centaur Server and Software on page 11 Click Start Programs CDV Americas Centaur and click MSDE Management Console or directly from within Centaur click the Open Database Backup Scheduler icon from the main menu bar The MSDE Management Console window will appear From the Database Tree View window left hand portion of your screen double click the Jobs branch From the Details window right hand portion of your screen right click the desired job and click Delete job A dialogue box will appear requesting confirmation Manufacturing Ac
144. facturing Access Control Since 1985 A PJ REFERENCE MANUAL Figure 18 Overview of Card Programming Program the Holidays and assign each holiday to one or more Holiday Groups Holiday Properties EN Holiday Details Day 1 S Month z Year 2008 s IV Holiday Group 1 FF Holiday Group 2 F Holiday Group 3 TF Holiday Group 4 Program the Access Levels by assigning a schedule to each selected door Here we programmed the Production access level Access Level Properties x Access Level Doors and Schedules Door Schedule I Front Door General M Production Entrance Production Schedule z Always E General Never Production Schedule Weekly General Program the periods and assign the desired Holiday Groups for each desired Schedule Schedule Properties E Schedule Details Sat Holl Hol2 Hol3 Hol4 3 Period 1 Period 2 Period 3 Period 4 Period 5 Period 6 Period 7 Period 8 Y S 5 a S i a Sa a oa EL s 8 ie ie A ES m om lee en th lee m m m m i a Ke m imi m m m A a mm m m a a ke m om m m oe m mi m a a a i a m m o m m OO Assign the desired Access Levels and program the required Card properties Card E Card Holder User Defined Data Photo Site Card Number HEX El Last Name Family Number 00247 First Name Card Number 01234 Company Name P n 00000000 Floor Group
145. fer to Elevator Control on page 105 a reader can be installed inside an elevator Each controller s door elevator cart can be programmed with a general public access schedule by assigning a schedule to each of the door s assigned floors This defines for the selected door which floors are accessible to the general public no access card required and during which time period Please note that to program these schedules the door type must be set to Elevator see Door Settings on page 71 Door Properties A The Elevator Floor Schedule cannot be used with doors located on a 2 Door Expansion Module doors 3 to 8 Only the controller s doors can be set for elevator control Setting Up a Door Public Access Schedule K K K A A K K K K A A A K A K A A A K K K Perform the following to assign one or more floors to a door and to assign a schedule to each floor 1 To assign a floor to the door select the check box associated with the desired floor The Schedule drop down list will become active 2 From the Schedule drop down list select the schedule you would like to assign to the selected floor Although there is only one Schedule drop down list you can assign a different schedule to each selected floor The selected schedule will be assigned to the highlighted floor whose check box is se
146. g computer is online These controllers also feature online upgradable firmware and a real time clock Program each controller individually by defining its door input and output configuration as well as setting its anti passback options For additional communication settings refer to Sites on page 23 Each site can support up to 256 controllers Manufacturing Access Control Since 1985 Adding Controllers Perform the following to add one controller or multiple controllers at one time 1 From the Database Tree View window right click Controllers from the desired Site and select New Controllers from the drop down list You can also click Controllers and press the keyboard Insert key 2 Adialogue box appears providing you with the option to automatically create and link the default doors inputs and outputs to the new controller s To use the Controller Configuration Wizard click Yes and follow the steps detailed in Controller Configuration Wizard below Otherwise click No and continu with step 3 3 Select the desired controller address es and click OK For more information on controller addresses refer to Viewing the Controller Address on page 52 After adding the controller s you will have to program each controller individually within the Controller Properties window see Modifying a Controller on page 52 Controller Configuration Wizard The Controller Configuration Wizard guides you through the
147. group and press the keyboard Enter key The appropriate Properties window will appear allowing you to configure the group General Group Properties From this window select the appropriate Door Floor Input or Relay Group tab This will allow you to view the site s address as well as record the group s name and any additional notes Addresses At the top of the Group tab Centaur will display the group s address as well as the address of the site to which it belongs The first group created is assigned Group 3 as its address except for Elevators which will be Group 1 Every time a group is added Centaur increments the group s address by one Addresses 1 and 2 are reserved for the All and None groups Name Use the Name text field in the Group tab to identify your groups We recommend using a name that is representative of the group such as Management Floor Group Also refer to Typing Names and Notes on page 22 Notes Use the Notes text field in the Group tab to record any additional notes that may be required We recommend that you keep a log of what settings were changed and when they were changed Also refer to Typing Names and Notes on page 22 Floor Group s Floors and Schedules From the Floor Group Properties window select the Floors tab This will allow you to define which floors in a site that a card holder has access to and when access can be granted to these floors The floor groups are
148. he door This means that the two card holders will have to present their cards one after the other within the defined delay as defined in the Two card rule delay on page 75 Selecting the Reading Devices From the Reading device drop down list select the device that will be used to obtain access to the door either a keypad or a reader Reader If you are connecting a reader or a reader and a keypad select Reader from the drop down list The controller will recognize the use of a keypad if a keypad has been set up in the controller door configuration see Selecting the Door Reader and Keypad Configuration on page 55 Keypad If you are connecting only a keypad no reader to the door input select Keypad from the drop down list Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Doors Selecting the Lock Control Type From the Lock Control drop down list select the activation locking method that will be used by the door when an Access Granted or Unlock event occurs De energize To operate in fail secure mode apply power to unlock a door select De energize from the Lock Control drop down list This means the selected lock output on the controller will remain de activated When an Access Granted or Door Unlocked event occurs the controller will apply power to the lock output If an electric door strike is used this mode will keep the door locked during a total power loss E
149. he red LED s PGM output address If there is no red LED associated with the door select None 12 From the Buzzer drop down list select the buzzer s PGM output address If there is no buzzer associated with the door select None 13 Click Finish Manufacturing Access Control Since 1985 Modifying a Controller To modify an existing controller right click the desired controller from the Controllers and click Properties from the drop down list You can also click the desired controller and press the keyboard Enter key The Controller Properties window will appear allowing you to configure the controller General Controller Properties From the Controller Properties window select the Controller tab to view the controller s address as well as record the controller s name and any additional notes Controller Configuration Antipassback Expander Controller Properties Site 2 Controller 1 Viewing the Controller Address Name gt At the top of the Controller tab Centaur will display the site s address as R well as the controllers address Each controller in a site is assigned to an A address by setting the dip switches located on the controller see Table 3 on page 53 Also refer to Figure 9 on page 54 The controller addresses are greatly affected by the controller s COM port assignment Please refer to Assigning COM Ports to Controller Addresses on page 30 for more information Manufactu
150. he selected input The active state of the input is reinstated when the operator uses the Enable Input command or when enabled by the input s enabling schedule see Selecting the Input Enabling Schedule on page 121 Figure 38 Display Input Status E Contour input Status Sosed Alm Sese Sesied eso fesed Right click the Visual display and text description desired input of current live input status then select the desired action Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Manual Controls Displaying and Controlling the Status of an Output the system If you wish to manually change the status of an output right click the desired output You can also select multiple outputs to manually change in the same way by clicking on the outputs while holding down the keyboard Shift or Ctrl keys and right clicking on one of the selected outputs A drop down list will appear Select one of the following actions from the list Also refer to Outputs on page 125 b When you click on the Output Status icon from the menu bar Centaur will display the current live status of the outputs in Activate Output Activates the selected output for the period specified by the output s Activation Time see Setting the Output Activation Events on page 128 Activate Output Timed Activates the selected output for a programmed period of time When you select this action the Activatio
151. he users that will access the Centaur Server must be programmed in the server The DCOM Configuration Utility is automatically installed with Windows 2000 2003 XP operating systems We recommend this settings to be done by a network administrator Manufacturing Access Control Since 1985 F ATTE i REFERENCE MANUAL iguration DCOM Configuration for Windows XP To be able to configure the DCOM on Windows XP operating system you have to be logged in as Administrator Verifying DCOM Before going on with the DCOM configuration you can perform the following steps to verify the integrity of your DCOM 1 From the taskbar click Start gt Run The Run window will appear Enter dcomenfg exe in the text box and click OK A eee 2x Type the name of a program Folder document or F Internet resource and Windows will open it for you Open dcomenfal e Cancel Browse 2 The Component Services window will appear Within the Console Root folder left side of your screen expand the Component Services branch the Computers branch and the My Computer branch Ensure that the Running Processes folder appears in the My Computer branch If it does not appear you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 186 if not skip the next section and go directly to Setting the Firewall on page 189 Component Services a Senses Evert Viewer Loca
152. ick Acknowledge 4 The Operator Acknowledge event appears in the Real Time Events Status window View all acknowledged events by clicking the Acknowledged Events icon from the tool bar To view any recorded comments click the Acknowledged Events icon right click the desired event in the Real Time Events Status window and click View Comments Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Events s E Mail Activation After selecting an event as described in Event Definition Overview on page 134 click the E Mail tab in the event s Access granted properties window to program the E Mail settings for that event Settings for Default z General Alams E Mail CCTV Conta Front Door TF Send E Mail a A Production Entrance chod le Never Enabling Sending E Mail for an Event P amp D aL Select the Send E Mail check box to send E Mail whenever the selected event occurs When selected all fields become available Message Selecting the E Mail Schedule for an Event Select the schedule from the Schedule drop down list which determines when Centaur can send the programmed E Mail If the selected schedule is not valid when the event occurs Centaur does not send the associated E Mail The Schedule list is only available if the Send E Mail check box is selected For more information on schedules see Schedules on page 43 Typing the Operator E Mail Add
153. ign the period to a holiday group select the check box es corresponding to the desired holiday groups For more information refer to Assigning Holiday Groups to a Schedule Period on page 47 5 Click OK Example In Figure 7 the schedule will be valid from Monday to Friday between 7 00AM and 9 00PM and from Saturday to Sunday between 9 00AM and 1 00PM The schedule will not be valid on any programmed holidays Manufacturing Access Control Since 1985 Figure 7 Schedule example Schedule Properties Schedule Details Start End Sun Mon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hol4 Period1 0700 2100 Period 2 0900 1300 Period 3 0000 0000 Period 4 foooo foooo Period 0000 0000 Period 6 ooo ooo Period 7 0000 0000 Period8 0000 0000 mo m m A a a e E G U U U E iS mo m m m i a a E E u a U E Ux COC IA A M1 CO A A 1 CO A A 1 CI A 1 Setting the Period Start and End Time When defining the schedule period see Schedule Periods on page 45 the Start and End text fields define when the schedule is valid The start and end times apply only to the selected days of the week Note that you must use the 24Hr clock to program the times i e 6 00PM 1800 If you want the period to be valid 24 hours a day type 0000 into the Start text field and 2400 into the End text field A The start and end time of a single period cannot cross over into another day You must use separate periods For example 23h
154. iguration permissions Use custom configuration permissions You may edit who can change the configuration information for this application Under Use custom access permissions click the Edit button NB The Use default launch permissions and Use custom configuration permissions check boxes are selected by default Registry Yalue Permissions x Registry Value AccessPermission Owner Account Unknown Name John Doe John D oe Allow Access amp User 1 User 1 Allow pena User 2 User 2 Allow Access Type of Access Allow Access y Lok cme add _Hemove Heb 2 The Registry Value Permissions window pops up To add users click on the Add button Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration J The Use default launch permissions and Use custom configuration permissions check boxes are selected by default The Registry Value Permissions window may be empty depending on the previous DCOM configurations The Add Users and Groups window pops up From the List Names From drop down list select the computer or domain To view the list of users either click Show Users or if the user is part of a user group select the group and click Members Select the desired user from the list Hold down the keyboard Ctrl key while left clicking to select multiple users Click Add and OK xi List Names From B MAOCDW Names D RESTRICTED Restricted code de SYST
155. igure 6 Building s logical floors Site Properties Site Comms Cards Floors coTY CMPP Logical Floor 8 5 Fifth Floor 4 Fourth Floor Sai 3 Third Floor 2 Second Floor eE 1 First Floor Poo G General Floor eii l SB1 Parking Level 1 Logical Floor 1 SB2 Parking Level 2 Manufacturing Access Control Since 1985 Site CCTV Port Settings If a site requires CCTV control you must activate CCTV control to define through which COM port the CCTV commands will be sent and what communication settings the COM port will use Select the CCTV tab from the Site Properties window Activating CCTV Control for a Site Select the Activate CCTV Control check box if you want Centaur to process CCTV commands Whenever an event occurs that is assigned a CCTV command refer to Selecting the CCTV Command for an Event on page 140 Centaur transmits the CCTV command to the video switcher connected to the selected COM Port If you do not activate CCTV Control Centaur ignores any CCTV command assigned to system events Selecting a Computer COM Port for CCTV From the COM Port drop down list select the computer COM port used to communicate the CCTV commands to the video switcher Connect the video switcher to the selected COM port The selected COM port will use the communication settings defined by the Baudrate Data Bits Parity Stop Bits and Flow Control lists Selecting
156. information Open Database Management Module Refer to Database Management Module on Ctrl F3 Module gt Database Management page 172 for more information Open Database Backup Scheduler or Refer to Database Backup Scheduler on Ctrl F4 Module gt Database Backup Scheduler page 178 for more information Open FrontGuard S Ctrl F5 Module gt Front Guard Open Locator UE Ctrl F6 Module gt Locator Open WavePlayer ch Refer to Centaur Wave Player on page 181 for Ctrl F7 Module gt WavePlayer more information Open Pro Report Ctrl F8 Module gt Pro Report Open FrontView z Ctrl F9 Module gt FrontView Open Diagnostic Tool kg Ctrl F10 Module gt Diagnostic Tool Open Headcount rey Ctrl F11 Module gt Headcount Open CMPP E Allows loading or adding a card using a CMPP Ctrl F12 Module gt CMPP Gives information about the Centaur Administration software and CDVI Americas contact information Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Understanding the Centaur User Interface gt Database Tree View Window The Database Tree View window located in the left hand portion of your screen allows to create and configure a site including all its objects From the Database Tree View window you can create and or modify e Sites on page 23 e Holidays on page 39 e Schedules on page 43 e Controllers on page 49
157. ion Permissions srveeseneasanessenneseny Access Permissions C Use Default e Use Default C Customize In the Select Users Contacts Computers or Groups window type the group s name you have created in the Enter the Object Names to Select Select Users Contacts Computers or Groups 2 x j Select this object type Users Groups or Other objects Object Types From this location e Locations Enter the object names to select examples Advanced a A Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration J Click on the Check Names button to validate the name of the group and click OK Select Users Contacts Computers or Groups 2 x Select this object type Users Groups or Other objects Object Types From this location pe Locations Enter the object names to select examples Centaur Group Check Names Advanced Cancel Select the two Allow check boxes in the Permissions for Centaur window axl f Security Group or user names Giese Permissions for Centaur Allow Deny Local Access Remote Access Manufacturing Access Control Since 1985 Click the Identity tab and select The interactive user check box 2x General Location Security Endpoints Identity Which user account do you want to use to run this application The launching user This user User
158. ion type is Direct Serial Port Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Figure 3 Example of COM Port Assignment COM Pot 1 CTL 1S4 com 3 Used by another application CT V900 A RS 485 CT V900 A Access Control Systems Controller Controller network up to Address SERVER Adamss 220m 40008 a Does not require RS 485 Converter CA A360 USB COM Ports Modem Cable Up to 8m 25ft Up To 64 Controllers CT V900 A CT V900 A Controller RS 485 Controller Address network up to Address 65 1 220m 4000ft 128 RS 232 Does not require RS 485 Converter CA A360 USB Modem Cable Up to 8m 25ft Assigning Dial up Site Telephone Number If the selected communication type is Dialup Modem type the dial up site telephone number in the Phone Number text box When attempting to connect the Centaur Server computer will dial the number recorded here and will try to communicate with the remote site through a modem Figure 4 Example of Dial up Site Access Costes Systems SERVER Remote site telephone number 555 1234 This Dial up Site is the sag a oe enter in the one Controller Network Nasser Seat te Assigning the Dial up Site Modem Type If the selected communication type is Dialup Modem from the Modem drop down list select the Centaur Server computer modem that will be used to communicate with the controller network
159. is cleared the decimal format is used This setting will also be used when displaying the card numbers in the Real Time Events Status window From list beside the Hexadecimal Card Numbers select the type of the card 26 Bits 6 Digits or 30 Bits 7 Digits that will be used by the controller Enabling the Use of Unique PIN Numbers When you select the Unique PIN Numbers check box Centaur will not allow you to create a duplicate PIN If you wish to use duplicate PINs clear the Unique PIN Numbers check box Also refer to P I N on page 93 Enabling Distributed Card Programming Select the Distributed Card Programming check box if you want Centaur to download only the cards that are required by each controller which is determined by each card s assigned access level This increases the number of cards available in your controllers since less data is being stored in the database For example if your system has 50 controllers and a card s assigned access level contains only two doors both from the same controller then Centaur only downloads that card to one controller instead of all 50 controllers lf you clear the Distributed Card Programming check box Centaur sends all cards to all controllers in the system Extended Access Levels Levels 3 4 By default up to two access levels can be assigned to each card If two access levels are assigned to a card access is granted as long as one of the two access levels is valid when the card is
160. isplay every drop down list under the Status heading select the desired interval of time Event Colour Definitions Centaur provides the ability to customize the text and background colour of each event logged in the system You can set events to use its default colours or a custom colour definition When an event occurs it will appear in the Real Time Events Status window with po ed ilsi ai Access denied Card invalid its defined colours default or custom Access denied Card lost Access denied Card number unknown Access denied Card stolen Access denied Door manually disabled Access denied Interlock active Usi n g Defau It Syste m Eve nt Col O u rs Access denied Invalid access rights Access denied Invalid floor group schedule Access denied Passback violation in Perform the following to use an event s default system colours Access denied Passback violation out Event Colours Access denied Schedule invalid titeann finar aalantad 1 From Centaur s main menu select the Options menu and Event Colours Text Cour 7 Background Colour 2 From the Event Colours window highlight the desired event AS 3 Select the Use System Colours check box Cancel 4 Repeat steps 2 and 3 until the desired events are set 5 Click OK Customizing Event Colours Perform the following to set an event to use a custom set of colours 1 From Centaur s main menu select the Options menu and select Event Colours
161. ition Language SDDL syntax In the new window click on the Edit Security button DCOM Machine Access Restrictions in Security Descri PR Template Security Policy Setting E DCOM Machine Access Restrictions in Security Descriptor Definition Language SDDL syntax If the security descriptor is left blank after defining the policy setting in the template the policy setting will not be enforced Security descriptor Edit Security Manufacturing Access Control Since 1985 ZA REFERENCE MANUAL Click on the Add button and select the Centaur group that has been created before Under Permissions for Centaur check if the two Allow check boxes are selected and click OK 21x 5 wl Group or user names Centaur TEST Centaur Permissions for Centaur Allows Deny Local Access Remote Access 3 Redo the step 2 to step for DCOM Machine Launch Permissions in Security Descriptor Definition Language SDDL syntax Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration moa DCOM Configuration for Windows 2000 Pro and Server To be able to configure the DCOM on Windows 2000 operating system you have to be logged in as Administrator From the taskbar click Start gt Run A 21x Type the name of a program folder document or Internet resource and Windows will open it For you Open dcomenfgl y Sen rasa 1
162. k on page 60 When using Entry and Exit door types see above card holders must enter and exit through a door on the same controller Manufacturing Access Control Since 1985 F USE REFERENCE MANUAL When using the Global Entry and Global Exit door types a card holder can enter through a door defined as global entry and then the card holder can exit through any door defined as global exit You can also reset the global anti passback status of all card holders For more information refer to Selecting a Site s Global Anti Passback Reset Schedule on page 34 Global Entry and Exit will only function when the Centaur Server is online connected Please note that when using Global Entry and Exit the Centaur system will also generate a Waiting for Host event with every Access Granted event generated from a door defined with Global Entry or Exit Example As demonstrated in Figure 14 if a card holder were to enter through door 1 Global Entry the card holder would be able to exit through either door 1 Global Exit or door 2 Global Exit but not through door 3 since it is not defined as a Global Exit meaning that the card holder would still be considered as in Figure 14 Global Entry Exit Door 2 Global Entry Exit Door 1 Global Entry Exit Door 3 Entry Exit Two Card Rule Select the Two Card Rule door type when two card holder credentials are mandatory to access t
163. l Since 1985 Purging Databases Using this feature you can delete events that occurred between a specified period of time and within a selected site or within all sites The purge feature will not affect the Main database only the Event database Perform the following to purge events from the Event database amp Do not use the purge feature to reduce the size of the database or to delete large numbers of events Instead use the Truncate feature see Truncating Events on page 175 Also any alarms that require acknowledgement see Alarm Acknowledgement on page 137 that have not been acknowledged will not be deleted After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SpxDBase Centaur Database Utility window will appear From this window select the Advanced tab and click the Purge Events button REFERENCE MANUAL CENTAUR 4 2 Database Management e e SPXDBase Centaur Database Utility Backup Size Advanced Attach Register the database files with SOL Server Please make sure that the files you wish to attach Centaur3E vents mdf and Centaur3M ain mdf are located in the same directory as this application Detach Unregister the database files from SQL Server Remove Unregister the databases from SQL Server and remove the files completely Delete events from the event database by Date Ple
164. larm Acknowledgement Options E The following options are available under the Alarms heading These options only apply if alarm acknowledgement is enabled see Enabling Alarm Acknowledgement on Make a beep on all events page 137 J7 Make a beep on all Access events Make a beep on all Abnormal events Update events every 0 5 y seconds Display a Notification Message Status When the Display a notification message check box is selected a pop up window will appear to notify you that an alarm requiring acknowledgement has occurred when your Centaur access control software is minimized or running in the background Therefore if you are working in another program such as Microsoft Word or if the Teea Centaur access control software is minimized a pop up window will appear asking you if you would like to view the alarm now If you click Yes it will maximize return to the Centaur access control software If you choose to ignore the alarm click No P Update status display every 0 5 seconds Make a Beep When the Make a beep check box is selected your computer will beep every time an alarm requiring acknowledgement occurs Setting General System Event Options The following options are available under the Events heading Make a Beep on all Events When the Make a beep on all events check box under the Events heading is selected your computer will beep every time an event appears in the Real Time Events St
165. late open Open too long foso I Time and attendance aa Extended access for 5 Two card rule delay 005 elevator cart for elevator control The door cannot be used for any other purpose Also note that options and features located in the Elevator Control tab can only be set when the Door Type is set to Elevator see Floor Public Access Schedule on page 79 Each controller door can control up to 64 floors for one elevator cart Please note that the number of floors is defined per site and not per door see Site Floor Settings on page 35 For example if you define a site with 20 floors and set up four doors from the same site for elevator control each door will represent a different elevator cart for the same 20 floors A The Elevator door type cannot be selected for doors located on a 2 Door Expansion Module doors 3 to 8 Only the controller doors can be set with the Elevator door type Entry or Exit Select the Entry door type for the reader located on the entry side of the door and select the Exit door type for the exit reader located on the other side of the door This configuration must be used to implement the local Anti passback feature see Enabling Controller Anti passback on page 60 Global Entry or Global Exit These door types allow you to use global anti passback which functions independently and provides more versatility than the local anti passback feature see Enabling Controller Anti passbac
166. lder with the selected card Card Holder User Defined Data Photo which is commonly used with Centaur s visual authentication feature Proto Data TO see Centaur Card Management Feature on page 96 When a card is presented to a reader Centaur s visual authentication software can display the card holder s picture Select the Photo tab and type the photo s path in the Photo text field or click the button and select the photo from the list By default Centaur will display the Default jpg file Deleting a Card In the Database Tree View window right click the desired card and click Delete from the drop down list You can also select the desired card and press the keyboard Delete key A dialogue box will appear requesting confirmation Also refer to Centaur Card Management Feature on page 96 Manufacturing Access Control Since 1985 A PJ REFERENCE MANUAL Centaur Card Management Feature Centaur Card Management feature is an application that is automatically installed with the Centaur software It provides an easy to use interface to program the card properties see Card Holder Details on page 91 without having to deal with long card lists in the Database Tree View window and includes an advanced search engine You can run Centaur Card Management feature without having to run Centaur Starting Centaur Card Management Feature Centaur Card Management feature can be started using one of two methods T
167. lected 3 Return to step 2 to assign another floor and schedule or click OK to save and exit Example In Figure 16 the Parking Level 2 floor is enabled and has been assigned the Weekly General schedule This means that access to that floor is unrestricted when the Weekly General schedule is valid Any user even those without access cards can access the Parking Level 2 floor Manufacturing Access Control Since 1985 A PJ REFERENCE MANUAL Figure 16 Example of Programming a Door s Floor Schedules Door Properties Door General Inputs and Outputs Elevator Control Floor Unlock Schedule weekly General y Parking Level 1 General Floor First Floor Second Floor Thrid Floor Fourth Floor Fifth Floor Deleting a Door To delete an existing door right click the desired door from the Doors branch and click Delete from the drop down list You can also select the desired door and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 m REFERENCE MANUAL CENTAUR 4 2 Doors Display Door Status When you click on the Door Status icon from the menu bar Centaur will display the current live status of the doors in the system If you wish to manually change the status of a door right click the desired door You can also use the keyboard Shift or Ctrl key to select
168. ler First controller of a site Access Costra Systems LAN WAN SERVER To other controllers il RS 485 or RS 232 CABLE 7 6m 25ft max REMOTE SITE CA ETHR A CT V900 A TCP IP Converter 2 Door Controller First controller of a site 7 6m 25 Start point of the RS 485 CA A360 USBRS controller network Furthest RS 5 Converte controllers can be up to 1220m ee time To other 4000ft from start point controllers RS 485 Manufacturing Access Control Since 1985 ZA REFERENCE MANUAL Selecting the Site Baud Rate It is important that the baud rate be set to the same value that is defined by the dip switch settings of the controllers the controller default setting is 19200 baud in the site Click the Baud Rate drop down list and then select the appropriate baud rate from the list This setting will only be available if the selected communication type is Direct Serial Port Selecting the Site Speed Click the Speed drop down list then select the appropriate speed from the list This setting defines the speed of data transfer between the Centaur Server computer and the site controllers During normal operation the speed should be set to Fast Selecting the Site Communication Schedule A site can be programmed to automatically communicate with the controllers go online according to a schedule When the schedule becomes valid the Centaur Server computer will automatical
169. level and press the keyboard Delete key A dialogue box will appear requesting confirmation You cannot delete the default All and None access levels Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 9 Cards What Will Find Adding Card Siers eck ee A a eee eae ed ee a ee Pe E a Welle ee ee 89 Modiying a Callas cae esha ak a ccna al le sat d acai ee tons Pare Seg 91 Deleting a Card cui thea dda bedded bbb dd edad dae ln ridad 95 Centaur Card Management Feature 96 Centaur Card Import Export Feature 102 Programming a card allows you to define the card s specific privileges and any details concerning the card holder When setting up the card holders in the system you must define WHO has access to WHERE and WHEN they have access In order to program the cards you must first program the site see Sites on page 23 doors see Doors on page 67 holidays see Holidays on page 39 schedules see Schedules on page 43 and access levels see Access Levels on page 83 Please note that the number of cards your system can support is also limited by your Centaur edition refer to Centaur Editions on page 2 Example In Figure 18 John Doe will have access to the Production Entrance from 8 00AM to 5 00PM Monday to Friday including New Year s Day and 9 00AM to 13 00PM Sunday and Sathurday Manu
170. loors 143 Floor Group Alternate 143 Floor Groups Assigning Floors 143 Selecting a Schedule 143 Setting an Alternate Floor Group 143 Floors 143 Definition 35 Number of 35 Schedules foreach 79 FontCard 18 FrontCard 13 152 FrontGuard 13 18 FrontView 13 18 G General Centaur Options 160 General Controller Properties 52 General Door Properties 69 General Holiday Properties 40 General Properties Schedules 45 General Properties for Security Levels Permissions and Opera tors 149 General Tab Door Programming 71 Generate Unique PIN 33 Global Entry Exit 71 Groups 141 142 Floors 92 Groups Are Used Where 142 Groups Holiday 41 H Hardlock key 10 Hard passback 60 Headcount 18 Manufacturing Access Control Since 1985 Help 18 Hexadecimal Card Numbers 33 Holiday Groups in Schedules 47 Holiday Properties Details Tab 40 Holiday Tab 40 Holiday Tab 40 Holidays 39 Holidays and Holiday Groups 47 l Importing Cards 103 Input Configuration 57 Input Configuration for Anti passback Reset 60 Doors 76 Interlock 77 Mantrap 77 REX 76 Input Connections 116 Input Groups also see Groups 144 Assigning Inputs to an Input Group 144 Input Properties Bypassing Inputs 121 Details Tab 121 Input Configuration 121 Input Enabling Schedule 121 Input Response Time 121 Input Tab 119 Input Speed 121 Input status 17 Input Status Display 168 Input Tab 119 Inputs 115 Inputs and Outputs Tab 76 Installation amp Use 1 Installation Cent
171. lsevr exe found on C Program Files Microsoft SQL ServerMSSQL Binn Please refer to your firewall documentation if you need help If you are using the Windows firewall follow these steps to alter your settings From the taskbar click Start gt Control Panel amp Control Panel File Edt View Favorites Tools Heb Ox QB Pozo re E Address Be control Panel E Control Panel sy pe g Switch to Category View Scannersard Scheduled Software Cameras Tasks Explorers See Also gt O 43 Window i SoundMAX Soundsand Windows Update Poe iaasa ld e Sa Taskbar and User Accounts MAS Wreless Start Menu MEA NetworkSet Help ard Support 1 The Control Panel window will appear Double click on the Windows Firewall icon Manufacturing Access Control Since 1985 N REFERENCE MANUAL 4 2 figuration The Windows Firewall window will appear From the Exceptions tab click Add Port Windows Firewall General Exceptions Advanced Windows Firewall is tumed off Your computer is at risk of attacks and intrusions from outside sources such as the Intemet We recommend that you click the General tab and select On Programs and Services Nome _ Intemet Explorer M Java TM 2 Platform Standard Edition binary Microsoft Management Console Remote Assistance O Remote Desktop Skype O UPnP Framework Windows Live Messenger 8 0 Phone M Windows Live Messenger 8 1 M Windows Live Messenger 8 1 Pho
172. ly and click OK The selected event will appear in bold under Events in the Database Tree View window to indicate that changes were made Programming a Default Event Definition A default event definition enables you to program the same settings for more than one device usually to apply to all devices in Access granted the list When you select Default from the Settings tor drop Settings for MEET down list see step 2 in Event Definition Overview the Front Door a ane definitions that you program in the General Alarms E Mail and ee i E CCTV Control tabs will apply to all devices whose check boxes mm are cleared Action None Sd Timed 0 65535 ms max Programming a Device Specific Event Device aal T Schedule Never Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Events Ls Definition A device specific event definition enables you to program different settings for each device in the list When you select Devices from the Settings for drop down list see step 2 in Event Definition Settings for Devices sake jasal E Mail CCTV Contrl Access granted Overview on page 134 the definitions that you program in the Sa General Alarms E Mail and CCTV Control tabs will apply to the ei ii gt rr E highlighted device whose check box is selected ae Action None y Reset Event s Definition to Def
173. ly connect with the site until the schedule expires Click the Schedule drop down list and select the desired schedule from the list For more information refer to Schedule Periods on page 45 Assigning COM Ports to Controller Addresses Each site can support up to 256 controllers The 256 controllers are divided into four controller loops of up to 64 controllers each Each of these loops must be assigned to a specific COM port From the COM Port 1 CTL 1 64 list select a COM port Controllers connected to the selected COM port will be assigned addresses 1 to 64 controller s DIP switch setting From the COM Port 2 CTL 65 128 list select a COM port Controllers connected to the selected COM port will be assigned addresses 65 to 128 controller s DIP switch setting 64 From the COM Port 3 CTL 129 192 list select a COM port Controllers connected to the selected COM port will be assigned addresses 129 to 192 controller s DIP switch setting 128 From the COM Port 4 CTL 193 256 list select a COM port Controllers connected to the selected COM port will be assigned addresses 193 to 256 controller s DIP switch setting 192 By limiting the number of controllers on the COM port the speed of communication is increased Also refer to Viewing the Controller Address on page 52 for additional information on controller DIP switches and addresses This setting will only be available if the selected communicat
174. mance of the security system and shall not be responsible for circumstances resulting from the product s inability to operate Seller obligation and liability under this warranty is expressly limited to repairing or replacing at Seller s option any product not meeting the specifications Returns must include proof of purchase and be within the warranty period In no event shall the Seller be liable to the buyer or any other person for any loss or damages whether direct or indirect or consequential or incidental including without limitation any damages for lost profits stolen goods or claims by any other party caused by defective goods or otherwise arising from the improper incorrect or otherwise faulty installation or use of the merchandise sold Notwithstanding the preceding paragraph the Seller s maximum liability will be strictly limited to the purchase price of the defective product Your use of this product signifies your acceptance of this warranty BEWARE Dealers installers and or others selling the product are not authorized to modify this warranty or make additional warranties that are binding on the Seller For technical support in Canada or the U S call 1 866 610 0102 Monday to Friday from 8 00 a m to 8 00 p m EST For technical support outside Canada and the U S call 00 1 450 682 7945 Monday to Friday from 8 00 a m to 8 00 p m EST Please feel free to visit our website at www cdvi ca 2006 2008 CDVI Americas Ltd
175. minimum required settings to set up the default Create Controllers details Address Active Add Devices Controller 005 Controller 006 Controller 007 Controller 008 Controller 009 Controller 010 Controller 011 Controller 012 Controller 013 Controller 014 Controller 015 Input config doors inputs and outputs for the controller s 1 Check the Create check box for each controller you want to create Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll Controll 2 To change the controller s name double click on the name of the controller and type the new name 3 To automatically activate the controller once created select its Active check box mm jm fm a 4 Select the controller input configuration See Controller Configuration on page 55 for more information 5 Click Next Controller 001 Controller 002 Controller 003 Controller 004 Controller 005 Controller 006 Controller 007 Controller 008 Controller 009 Controller 010 Controller 011 ler 012 ler 013 ler 014 ler 015 ler 016 ler 017 ler 018 ler 019 ler 020 ler 021 ler 022 ler 023 ler 024 ler 025 ler 026 ler 027 ler 028 001 002 003 004 005 006 007 008 009 00 011 012 03 014 015 016 017 018 01
176. missions Permission Sites and Security Levels 1 From the Operator Permissions properties window select he Sites and Security Levels tab A list of all sites that have been created will appear E Manufacturing Plant Montreal with a check box on the left of each one 2 To assign a site to the permission select the check box associated with the desired site The Security Level drop down list will become active 3 From the Security Level drop down list select the security level you would like to assign to the selected site When a site is selected only Sach Lavell A security levels created for that site will appear in the drop down list Although there is only one Security Level drop down list you can assign a different security level to each selected site The selected security level will be assigned to the highlighted site whose check box is selected 4 Return to step 2 to assign another site and security level or click OK to save and exit Manufacturing Access Control Since 1985 y REFERENCE MANUAL Operators Operators enable you to determine which personnel are authorized to program control and or monitor the Centaur Access Control System through the Centaur software Define the login ID and password assign a permission and select which software modules will be accessible for each operator Setting the Operator s Access Rights Perform the following to define the operator s system privileges
177. monitor You can even set the cameras to tilt pan and or zoom Prior to assigning CCTV Commands to an event refer to Event Activated CCTV Control on page 140 you must program the CCTV commands which will define how the video switcher will react when selected system events occur Manufacturing Access Control Since 1985 Adding a CCTV Command Right click the CCTV Commands branch in the Database Tree View window and select New CCTV Command from the drop down list You can also select CCTV Commands and press the keyboard Insert key The CCTV Command Properties window will appear see Modifying a CCTV Command allowing you to configure the CCTV Command Modifying a CCTV Command Right click the desired CCTV Command from the CCTV Commands branch in the 5 5 CCTV Command Properties Database Tree View window and select Properties from the drop down list You can z also select the desired CCTV Command from the CCTV Commands branch in the General Detais Database Tree View window and press the keyboard Enter key The CCTV de Command Properties window will appear allowing you to configure the CCTV Command Name Cami vid General CCTV Command Properties From the CCTV Command Properties window select the General tab to record the CCTV Command s name and any additional notes Typing a CCTV Command s Name Use the Name text field in the General tab to identify the CCTV Command We recommend using a name that is r
178. multiple doors if you wish to modify several doors in the same manner at once and then right click on any of the selected doors A drop down list will appear Select one of the actions from the list For more information refer to Displaying and Controlling the Status of a Door on page 165 Door Status entaur Doar Status Fie View Options Mod vel ie m BASSO _ j etK SOCHVABHEYM EA Chad and Locked vecino osad and Loched seca a Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 8 Access Levels What Will Find Adding aniAccess Level aio le a a rt td E ae eek lee ees Bae 84 Moditying an Access Level iii A dese eda RA A AE A Ra 84 Deleting an Access Level 86 Access levels determine which doors in the system a card holder will have access to and during which periods This is done by enabling the desired doors in an access level then assigning a schedule to each selected door and assigning the access level to the desired cards Please note that the 256 access levels include two default access levels All and None which cannot be modified or deleted The All access level provides access to any door that exists in the site 24 hours a day including any programmed holidays The None access level will deny all access at all times For information on how the access level
179. n Time window will appear In the text box type a value from 1 to 9999 seconds and click OK Deactivate Output Deactivates the selected output Figure 39 Display Output Status Click the Output Status icon I Centaur Output Status Estes F Doce 001 01 Green LED Y o Fe Door 001 01 Red LED 12 on e amp Cords F Door 001102 Green LED 1 3 off GR Access Levels E On Hobdays F Doce 001 01 Sezer on 3 Sedes Fe Goce 001 02 azor 1 6 on UY cortrolers a f Events F Door 001 09 Red LED 1 8 of Groups e Seosty Levels Pae a Right click the O onson Visual display and text desired output then 5 CCTV Comand description of current select the desired action live output status Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 20 Database Management What Will Find What are the Centaur Databases 0 172 Database Management Module 172 Database Backup Scheduler 1 2 2 0 cc nett eee eens 178 Centaur s database file management feature is automatically installed with Centaur Server This database utility was designed to control and manage the often large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and
180. n also select Cards and press the keyboard Insert key The Card window will appear allowing you to configure the card properties Refer to Modifying a Card on page 91 for more information Card Holdet User Defined Data Photo Ste 1 Also refer to Centaur Card Management Feature on page 96 and Centaur Card Import Export Feature on page 102 Manufacturing Access Control Since 1985 y REFERENCE MANUAL You can also add a batch of new cards all at once rather than adding each card individually In the Database Tree View window right click Cards from the desired Site branch and select New Cards Within the Batch Adding Cards window specify how many cards you would like to create as well as any common card information you would like to specify for all cards and click OK Centaur adds the specified amount of cards to your database and auto increments the card numbers If you wish to modify the cards you will have to modify them individually within the Card window see Modifying a Card on page 91 Batch Adding Cards r Cards Information Maximum of cards you can create fi 6384 How many cards you want to create E What would be the family number oot 50 What is the starting card number 60001 What type of P LN you want None y r Common Cards Information Company Name Floor Group None Ba Access Level1 All Se Access Level 2 None Access Levels None z Status Start D
181. n the Action drop down list is labelled Timed you can type a value from O to 65535 seconds in the Timed text field The device will activate or deactivate for the period programmed in the Timed text field If the selected device is not Timed the Timed text field will be unavailable Device After selecting an Action use the Device drop down list to select which device or group of devices will be affected by the selected action Schedule The selected device s will only activate or deactivate when the schedule selected from the Schedule drop down list is active Also refer to Schedules on page 43 Example In Figure 32 any time 1 door 001 01 2 is forced open 3 relay 001 03 4B will activate 4A for 30 seconds 5 Figure 32 Example of Activating a Device with an Event Door forced open alarm Settings for Devices v General Alarms E Mail CCTV Control r Schedule far 001 01 Screen aways z i Disk always gt r Device Activation Activate Relay timed Timed 30 65535 ms max Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 y Events Lm Alarm Acknowledgement Alarm acknowledgement allows you to program an event to give operators a warning and or instructions concerning the event that just occurred These instructions will appear in the Alarm window Settings for Default z General Alarms E Mail CCTV Contal The operator can then acknowl
182. n to browse for the desired file Click the Backup button T SPXDBase Centaur Database Utility Backup Size Advanced Backup Make a backup of the current Centaur databases as selected below Restore Restore previously made backups of the current Centaur databases as selected below Please close the Centaur server before restoring Main Database Backup Path c main bak a M Main Database Event Database Backup Path fc event bak M Event Database NOTE Spaces are not supported in the path or in the file names LS Spaces are note supported in the path or in the file names Manufacturing Access Control Since 1985 y REFERENCE MANUAL Restoring Databases Restoring databases will bring back all information saved in a backed up database file bak so it can be used with the Centaur software Performing a restoration will attach the back up files to the SQL Server application and save them in C Program Files CDV Americas Centaur Centaur Server Data This will overwrite any databases currently attached If you are having problems with a database or if you have experienced a loss of data or if your database is corrupted due to a computer hardware failure you can restore any database that you have backed up Please note that you will have to add any programming changes that were done since the last backup was created If events are also restored all events that have occurred since the last backup will b
183. nce 74 Time Out Poll 59 Time Update Controller 65 Timed Event Definition 136 Timed Activation Schedule 111 Timed Relay Activation Manually 766 Timeout 162 Time Out Controller 59 Timers Delay Before Relay Activation 112 Extended Access 75 Open Too Long 74 Pre alarm 74 Relay Activation 112 Unlock 74 Toolbar 17 19 Trace Cards 93 Tracker LCD Display Option 67 Truncating Events 175 Two Card Rule 72 Type 27 Type Door 77 Typing Names and Notes 22 A PF REFERENCE MANUAL U Understanding the Centaur User Interface 15 Undo Changes Centaur s Card Management feature 97 Unique PIN Numbers 33 Unlock a Door Group 145 Unlock Both Doors 67 Unlock Door 165 Unlock Door Latched 165 Unlock Door Timed 165 Unlock on Late to Open Reading Type 73 Unlock Schedule 73 Unlock Time 74 Unlocked Reading Type 73 Update Controller Every Fifteen Minutes 32 Update events 160 Update Firmware 63 Update Time 65 Use Keypad 93 Use System Colours 167 User Definable Card Fields 32 User Defined Data 94 User Interface Overview 16 Using Centaur 1 Using Centaur s Card Management feature 97 V Valid Cards 94 Video Switcher Protocol for an Event 140 View 17 View Controller Status 65 View Security Levels 150 Viewing Events on Screen 135 W Waiting for Keypad Output Activation Events 129 WAV File Assignment 182 WavePlayer 13 18 What Are Groups 142 What are the Centaur Databases 172 Where Are the Groups Used 142
184. nd Prompt a The Command Prompt window will appear Type cd program files cdv americas centaur centaur server and press Enter b Type spxsvr exe service and press Enter Close the Command Prompt window LS Ensure that there is a space between spxsvr exe and the front slash nmand Prompt t Windows XP Version 5 1 2666 ight 1985 2061 Microsoft Corp C Documents and Settings fdugre gt cd program files cdy americas centaur centaur server C Program Files CDU Ameri Centaur Centaur Server gt sur exe service C Program Files CDU Americas Centaur Centaur Server gt Manufacturing Access Control Since 1985 4 2 1d Using Centaur Pa 7 Click Start gt Programs gt CDV Americas Centaur Centaur Service Manager 8 The Centaur Service Manager window will appear Select the Auto start service when OS starts check box Centaur Service Manager m E gt Start Continue 9 If you want the Service Manager to verify every 5 minutes if the service is running or not and then start it if it is not running select the Auto restart service when stopped check box Close the window IV Auto start service when OS starts 10 Restart your computer The Centaur Service Manager will now start automatically To run IT Autorestart service when stopped Centaur you will only need to click Start gt Programs gt CDV Americas Centaur Status Running Administration Console gt Administration Console Pluggi
185. nder the Reading Type heading select one or more of the following check boxes These check boxes determine how and when a controller will read log the presentation of a card to the door s reader Opened When the Opened check box is selected the controller will continue to read cards presented to the door reader when the door is already opened This option is commonly used in conjunction with the Controller Anti passback Settings see page 60 in high traffic areas This prevents Anti passback errors from occurring due to users forgetting to wait until the door is closed before presenting their card Unlocked When the Unlocked check box is selected the controller will continue to read cards presented to the door s reader when the door is already unlocked This option is commonly used in conjunction with the Controller Anti passback Settings see page 60 when the door may be unlocked by a schedule This prevents Anti passback errors from occurring due to a user presenting a card to a reader of a door that has already been unlocked by a schedule Unlock on Late Open When Selecting the Door Unlock Schedule see page 73 select Unlock on Late Open to prevent the door from unlocking automatically until the first person with valid access presents their card at the door Manufacturing Access Control Since 1985 A PR REFERENCE MANUAL Example The feature is enabled and the front door of an establishment has been progr
186. ne Mw aia M Display a notification when Windows Firewall blocks a program What are the risks of allowing exceptions The Add a Port window will appear In the Name field enter DCOM In the Port number field enter 135 Select TCP as your communication type and click OK Add a Port Use these settings to open a port throuch Windows Firewall To find the port number and protocol consult the documentation for the program or service you want to use Name DCOM Port number 135 O TCP CuDP What are the risks of opening a port Change scope 2 The Windows Firewall window will re appear From the Exceptions tab make sure that the DCOM check box below the Programs and Services heading is selected If you are configuring repairing the firewall settings on a workstation connected to the Centaur Server computer click OK and your done with this computer If you are repairing your firewall settings on the Centaur Server computer go to the next step Manufacturing Access Control Since 1985 Windows Firewall Exceptions Advanced Windows Firewall is tumed off Your computer is at nak of attacks and intrusions from outside sources such as the htemet We recommend that you click the General tab and select On Programs and Services Name cds Meg Server ode Nene Server F Fie and Panter Shang E rtemet Explorer E Java TM 2 Patioen Standard Edition binery E Me
187. nection When this option is selected see Setting the Controller Input Configuration on page 57 the controller will generate an alarm condition when the state of an input is toggled opened This set up will not support tamper or wire fault short circuit recognition Connect one device to each input For address assignment of the 2 Door Expansion Module s inputs refer to Viewing the Input Address on page 119 Figure 24 N C Input Connection Methods NC CONNECTIONS FOR NC CONNECTIONS FOR CT V900 A CONTROLLER CA A470 A Controller 2 Door Exp Address 1 Inputs Inputs Z1 2 Zi COM COM 23 4 22 Address 3 Z3 Address 5 COM 25 6 24 COM Z7 8 Address 7 Address 9 Z9 10 COM 211 12 Address 11 Address 13 213 14 COM Z15 16 Address 15 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Inputs ATZ 2R Connection When this option is selected see Setting the Controller Input Configuration on page 57 the controller will generate an alarm condition when the state of an input is toggled opened An alarm condition will also be generated when a cut in the line occurs but will not recognize a wire fault short circuit Connect two devices to each controller s input but only one device to each 2 Door Expansion Module s input For address assignment of the 2 Door Expansion Module s inputs refer to Viewing the Input Address on page 119 Figure 25 ATZ 2R Input Connection Method ATZ 2R CO
188. nergize To operate in fail safe mode remove power to unlock a door select Energize from the Lock Control drop down list This means the lock output on the controller will remain activated When an Access Granted or Door Unlocked event occurs the controller will remove power from the lock output If an electric door strike or an electromagnetic lock is used this mode will unlock the door during a total power loss Selecting a Keypad Schedule From the Keypad Schedule drop down list select the schedule that will determine when both a reader and a keypad must be used in order to gain access When the selected schedule is valid the card holder must present a valid card to the reader and then a valid P I N must be entered on the keypad before access is granted Only cards with the Use Keypad option enabled must enter a valid keypad P I N see Use Keypad on page 93 For more information on schedules refer to Schedules on page 43 Selecting the Door Unlock Schedule From the Unlock Schedule drop down list select the schedule during which a controlled door will automatically unlock For example you may want a door to remain open unlocked from 9 a m to 5 p m Monday to Friday To do so create the appropriate schedule and select it from the Unlock Schedule drop down list For more information on schedules refer to Schedules on page 43 Also refer to Unlock on Late Open on page 73 Setting the Reading Type Options U
189. ng the Hardlock Key A hardlock key is required to enable communication with Centaur s controller Centaur s software will run in Demo Mode when no hardlock key is detected The hardlock key is available in two different configurations one for parallel port and one for USB port The blue hardlock key is designed to be plugged into your computer USB port The black hardlock key is designed to be plugged into your computer parallel port Plug the parallel or USB hardlock key identified as Server to the port of the computer used as the Centaur Server Centaur Service Manager Plug the parallel or USB hardlock key identified as Workstation to the port of the computer used as a workstation The hardlock key is required on the computer used as the Centaur Server as well as on each workstation You must have the hardlock key plugged in the Centaur server workstation port before starting the Centaur Service Manager otherwise the software will run in Demo Mode Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Installing and Using Centaur E a Starting the Centaur Server and Software This section describes how to start the Centaur software from the Centaur Server computer or a networked workstation Note that before starting the Centaur software from a networked workstation the Centaur Service Manager must be started Starting the Centaur Server You must have the hardlock key plugged in the Centaur server port bef
190. nlocks the selected door until an operator re locks the door using the Lock Door manual command see Lock Door on page 165 or until locked by the door s schedule see Selecting the Door Unlock Schedule on page 73 Enable Door When an operator manually bypasses a door see Disable Door below this command will reinstate the active state of the selected door Disable Door Allows the operator to manually bypass the selected door The active state of the door is reinstated when the operator uses the Enable Door command see above or when enabled by the door s enabling schedule see Selecting the Door Unlock Schedule on page 73 Manufacturing Access Control Since 1985 REFERENCE MANUAL Figure 35 Door Status and Manual Controls Click the Door Status icon A cuts Unio Door Ted s nee Levels B coo 001 04 i Offline Uried Door Latche rod 2 O Sedis B boo 002 02 22 Cffine tnatie Door Y cereroters sable Door 1 Everts Delete gt dae r Properties iy Pa Visual display and text Pervwscre description of current live Right click the desired door s sido MN door status then select the desired action Displaying and Controlling the Status of a Relay When you click on the Relay status icon from the menu bar Centaur will display the current live status of the relays in the system If you wish to manually change the status of a relay right click the desired relay Y
191. nsion Modules do not support input doubling All inputs on the selected controller and its 2 Door Expansion Modules must be connected as described in ATZ 3R Connection Method on page 118 Configuring the Controller Communication Settings Under Communication configure the controller s communication settings IP Address and Port Number The IP Address and Port Number text fields are available only if the selected communication type is TCP IP LAN WAN as described in Selecting the Site Communication Type on page 27 Before entering this data you need a static IP address and port number for each CA ETHR A which should be provided by your Network Administrator You will then need to program each CA ETHR A with an IP address and a port number In the IP Address and Port Number text fields type the IP address and port number programmed into the CA ETHR A device that is connected to the controller If there are several controllers wired to one CA ETHR A device then each controller on that loop must be programmed with the same IP address as detailed in the example below The first time you program a CA ETHR A it will be done via a serial port using a null modem cable To initiate a communication with the CA ETHR A press the reset button and type postech with in 5 seconds if you pass this delay you won t be able to log in Once programmed you will be able to access the configurations easily by using a web browser and simply typing in
192. ntaur and can only be run on the Server This database utility was designed to control and manage the often large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and delete entire database files Starting the Database Management Module The Database Management Module can be started using one of two methods To start the module from within Centaur click the Open Database Management Module icon from the main menu bar If you open the Database Management Module from within Centaur the Restore Attach Detach and Remove database options will not be available To access all database options run the Database Management Module as described below 1 Make sure the SQL Server is running and that the Centaur Administration Console isn t running and the Centaur Service Manager is stopped and exit refer to Starting the Centaur Server and Software on page 11 2 Click Start point to Programs CDV Americas Centaur and click Centaur Database Manager 3 From the SPXDBase Logon window type the appropriate Logon ID and Password Centaur s database file management utility uses the same Logon ID and Password as Centaur Manufacturing Access Control Since 1985 Backing Up Databases REFERENCE MANUAL CENTAUR 4 2 Database Management s Performing a backup will save all information in the selected
193. nufacturing Access Control Since 1985 f REFERENCE MANUAL Figure 23 Sample Time Activated Schedule Example If you wish a relay to activate a bell from Monday to Friday at 8 00AM 12 00PM 3 00PM and 6 00PM for 10 seconds each time you would program the relay and schedule as follows Relay Properties Schedule Properties Relay Activation Schedule Details Schedules Timed activation Period 1 Activating Never Period 2 Timings Period 3 Activation time 10 seconds 0 to 85535 Period 4 Delay time before activation fo seconds 0 to 65535 Period 5 Period 6 0000 Non activated state De energize X Period 7 0000 0000 Period 8 0000 0000 End Sun Mon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hol4 At the Start of every period in the selected schedule the relay will activate for the amount of time specified in the Activation Time text box regardless of the period s End time Relay activation can be delayed by the value programmed in the Delay time before activation text box Selecting a Relay Activation Schedule From the Activating drop down list box under the Schedules heading select the schedule that will activate the relay for the period s defined by the selected schedule This feature will ignore the values programmed under the Timings heading and will follow the selected schedule only Setting the Relay Activation Timer In the Activation Time text field under the Timings heading typ
194. o REX associated with the door select None Door defaults Controller Address W177 Door 002 05 Door 002 06 Door 002 07 Door 002 08 002 002 002 002 05 06 07 08 ES Contact REX GreenLED RedLED Buzzer 21 22 13 14 17 23 24 15 16 18 25 26 19 20 23 27 28 21 22 24 cora From the Green LED drop down list select the green LED s PGM output address If there is no green LED associated with the door select None From the Red LED drop down list select the red LED s PGM output address If there is no red LED associated with the door select None Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Doors 22 7 From the Buzzer drop down list select the buzzer s PGM output address If there is no buzzer associated with the door select None 8 To add another door repeat steps 2 to 7 9 Click OK Modifying a Door Right click the desired door from the Doors found within the appropriate controller s branch and click Properties from the drop down list You can also select the desired door and press the keyboard Enter key The Door Properties window will appear allowing you to configure the door Door Properties Door General Inputs and Outputs Elevator Control Site 2 Controller 2 Door 1 gt General Door Properties The Door tab will allow you to view some of the system component addresses as well as record the
195. o a A e A SEEEN apa 161 Operator TIMGOUT eiii ee Ie LAR ee 162 Egg letter forsee aero 162 MANUAL CONTROLS iii is 163 Event Display csi aia 164 Manual COntrolS vacation E iaar AE Ea oca 165 DATABASE MANAGEMENT 200 ad 171 What are the Centaur Databases innniicinninnncnnninncnccnrcc RR RR anne aran 172 Database Management Module cecceeecceeeeceeeeceneeeseeeeeeeeaeeseeeceaeecaaeeaeeeaeeceaeeeaeecaeesaeesaeeseaeesaeseaeeseeeseaeesieeeeaeesieeseaeeeeeenaees 172 Database Backup Scheduler cocccccconininccnnionnocnnccnnncnncnn cnn nr 178 CENTAUR WAVE PLAYER iii ies 181 Centaur Wave Player uri ad 182 DCOM CONFIGURATION lt lt gt 50 gt w 0 000msiii ti 183 DCOM Configuration for Windows XP 0 eccceeceeeeeeeeeeeeeeeeeeeeeeeeaeeseaeeeaeeeaaeceaeesaeesaeeeaeeeaeeseaeeeaeeseaseaeesieeeeaeeseeeseaeeeieeseeeseeeeenees 184 DCOM Configuration for Windows 2003 Server nnocccinccconccnnncconccononnnnnnnnn nro cnn 206 DCOM Configuration for Windows 2000 Pro and Server 0 cccecceesceseeeeeeeeeeeeteaeeeseeceeeenaeecaeseaeesaeceeeeeaeeseaeesaeeseaeeeaeesiaeeeeeeneees 235 WARRANTY civic e liada 243 Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Control Software s Access Control Systems Chapter 1 Installing and Using Centaur What Will Find CENA Editions 1 A E BALA bes Rie Chad GE Skee aie mee ek 2 Installation Oveni W s 0000 e d
196. o delete an existing holiday right click the holiday from the appropriate Site branch in the Database Tree View window and click Delete You can also select the desired holiday and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 5 Schedules What Will Find Adding a Schedules i s runie aaa a ace E Ree A a ete ed A A ii es oe eect eee 44 Moditying a Schedule cit RR al Sale aad we He Rei eal SI e Ge Fae a Re aS aoe eee 44 Deleting a Schedule ui A dda Hehe ern ded id anes weeded eae hd eat 47 A schedule can be used to schedule tasks automate operations and to control access to doors elevator floors and much more Schedules play an important role in the operation of many Centaur functions and are widely used throughout the software see Table 2 on page 44 A schedule is made up of up to eight time periods which determine when that schedule will be valid Each period in a schedule specifies the days and times the schedule will be valid For example when programming doors a schedule can be assigned to a specific door and the schedule will dictate when the door can be accessed without the use of a card Manufacturing Access Control Since 1985 Table 2 Where schedules can be used
197. o start Centaur Card Management feature from within Centaur click the Open FrontCard icon from the toolbar refer to Toolbar on page 19 or click the Modules menu and click FrontCard You can also simultaneously press the Ctrl and F1 keys The FrontCard Site Selection window appears In the Site list select the site whose cards you want to view or modify and click OK To start Centaur Card Management feature without Centaur running 1 From Windows click Start Programs CDV Americas Centaur Administration Console and click FrontCard 2 From the Logon window type the appropriate Logon ID and Password Centaur Card Management feature uses the same logon IDs and passwords as Centaur If you are logging on from a networked workstation type the Centaur Server computer s network name or IP address in the Computer text field Select the desired language from the Language list 3 The FrontCard Site Selection window appears In the Site list select the site whose cards you want to view or modify and click OK Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 y Cards _ 5 Using Centaur Card Management Feature After starting Centaur Card Management feature all Cancel changes undo actions are performed using the icon toolbar at the s lala card top of the FrontCard window At any time you can ie i an eee card use the Card Holder User Defined Data and Photo tabs to view and or edit the cu
198. ole The Centaur Logon window will appear If you are starting a software module click Start Programs CDV Americas gt Centaur Administration Console gt the appropriate software 2 From the Centaur Logon window type the appropriate Logon ID and Password The default Logon ID is Admin and the default Password is Admin If you are trying to log on to a Centaur Server that is on a network type the Server computer s network name or IP address in the Computer text box From the Language drop down list select the desired language Click OK To allow access from remote workstations DCOM must be configured on the Centaur Server computer refer to DCOM Configuration on page 183 When starting Centaur for the first time a dialogue box appears asking if you would like to use the site configuration wizard Refer Adding a Site on page 24 for more information Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Installing and Using Centaur Software Modules All software modules listed below unless otherwise specified are automatically installed with the Centaur Server or Workstation software FrontCard This module provides an easy to use interface to program card properties and includes an advanced search engine For more information refer to Centaur Card Management Feature on page 96 Card Import Export Server only This feature enables you to export Centaur card data to a csv file or impor
199. ole several software features and the reference manuals for these software features which are all automatically installed together The reference manuals for Centaur hardware components are also available on the Centaur 4 2 CD Computer Requirements Centaur Server The Centaur software is designed to operate with IBM or IBM compatible computers running a suitable Windows operating system as detailed in the Operating System Requirements Centaur Server Pentium 4 512MB RAM 1GB for superior performance 1GB recommended 4GB for larger installations e RS 232 serial port depending on the installation more than one may be required For dial up sites the Centaur Server and each dial up site requires a US Robotics Sportster 56k baud modem external internal Other modems can be used but we recommend the above mentioned modem WinModems are not supported e Super VGA Monitor Operating System Requirements Centaur Server The Centaur Server has been tested on the following operating systems e Windows XP Home or Professional Edition English and French Service Pack 2 e Windows 2003 Server Edition English and French e Windows 2000 Professional Edition English French and Spanish e Windows 2000 Server Edition English French and Dutch Other software requirements available on the CD e DCOM e MDAC 2 8 Microsoft Database Engine MSDE 2000 Microsoft Internet Explorer version 6 0 or higher Acrob
200. on page 171 Database Backup Scheduler Centaur s database backup scheduler server only enables you to schedule regular backups of the Centaur databases You can back up the Main database and the Event database separately specify the location of the backup files and select how often daily weekly or monthly the backup will occur For more information refer to Database Backup Scheduler on page 178 Front Guard Visual Authentication Centaur s visual authentication feature uses events generated in Centaur to retrieve a picture and or video feed to help you identify card holders or to view the location where an event has occurred For more information refer to Centaur s Visual Authentication Software Operator s Manual Locator User Location Designed to function with the system s Global Anti Passback feature Centaur s Anti Passback Monitoring feature allows you to monitor when card holders enter and exit designated doors in real time retrieve card holder information and print customizable card holder access reports For more information refer to Centaur s Anti Passback Monitoring Software Online Help WavePlayer Event Driven Sounds Player This utility was designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs The sound can replay at programmed intervals until the alarm is acknowledged For more information refer to Centaur Wave Player on page 181 Pro R
201. on page 67 When a card is presented to an Entry reader the controller labels the card as in The next time the card is used it must be presented to an Exit reader in which case it will be labeled as out Please note that the card holder must exit from an Exit door associated to the same controller Two subsequent Entries or two subsequent Exits will cause the controller to generate the appropriate Access Denied Anti passback violation event Centaur also supports Global Anti Passback which functions independently of the local anti passback settings defined in the following sections For more information refer to Global Entry or Global Exit on page 71 Enabling Controller Anti passback Select the Anti passback tab and select the Anti passback check box to activate the anti passback feature Controller Properties Controller Configuration Anti passback Expander Selecting the Anti Passback Schedule o E FT Anti passback Schedule Ne er z From the Schedule drop down list select the schedule during which the E a anti passback status of card holders will be monitored Note that the Anti a A passback check box must be selected For more information on schedules T Reset on Input Input None Y refer to Schedules on page 43 Activate Relay When Area is Empty Nne Enabling Hard passback Lock Control Entry Exit Doors I Unlock Door 1 and 2 I Unlock Door 5 and 6 Select the Hard passback check box to deny a
202. ontroller LS Each site must be updated separately We recommend one controller at a time Updating Controller Firmware Once the firmware files have been downloaded from our website the controller s can be updated within Centaur Perform the following to update the controller s firmware 1 Ensure that you are connected communicating with the controllers in Centaur The Centaur software must be running 2 Within Centaur expand the desired Site in the Database Tree View window and expand the Controllers folder 3 From the expanded Controllers folder right click on a controller whose firmware you would like to update and click Update Firmware 4 Under the Firmware Files heading browse and select the required HXH file 5 Click Update Manufacturing Access Control Since 1985 Download The Centaur software can download the following system characteristics to one or all controllers in a site access levels cards controllers doors holidays inputs input groups outputs output timings relays relay groups and schedules If any system characteristics are set when a controller is online Centaur will automatically download the information to all controllers in the site When to Use the Download Function When you update the controller firmware see Online Controller Firmware Upgrades on page 63 the controller memory will be erased You must download the Centaur database to the controllers e If you wish to
203. ontroller will change the state from off to on Energized The relay output is de energized when activated This means the selected relay output on the controller will remain energized until activated by a schedule or manually see Displaying and Controlling the Status of a Relay on page 166 When activated the controller will change the state from on to off Deleting a Relay To delete an existing relay right click the relay from the appropriate controller s branch in the Database Tree View window and click Delete from the list You can also select the desired relay and press the keyboard Delete key A dialogue box will appear requesting confirmation Display Relay Status and Manual Controls When you click on the Relay Status icon from the tool bar Centaur will display the current live status of the relays in the system If you wish to manually change the status of a relay right click the desired relay You can also use the Shift or Ctrl keys to select multiple relays if you wish to modify several relays in the same manner at once and then right click on any of the selected relays A drop down list will appear Select one of the actions from the list For more information refer to Displaying and Controlling the Status of a Relay on page 166 Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems
204. opening a pot Ca 2 3 The Windows Firewall window will re appear From the Exceptions tab make sure that the DCOM check box below the Programs and Services heading is selected If you are configuring the firewall settings on a workstation connected to the Centaur Server computer click OK and your done with this computer If you are configuring your firewall settings on the Centaur Server computer go to the next step Manufacturing Access Control Since 1985 Windows Firewall General Exceptions Advanced Windows Firewall is tumed off Your computer is at nak of attacks and intrusions from outside sources such as the intemet We recommend that you cick the General tab and select On E Java TM 2 Patton Standard Edtion binary E Merosott Management Console A Remote tesstance C Remote Desktop E Sye FA arr Sve men 9 Display a neeticaton when Windows Firewall blocks a pogram j Wh i o gt 4 From the Exceptions tab click Add Program Add a Program To allow communications with a program by adding itto the iors list select the program or click Browse to search for one that is not isted Programs E PQBoot ior Windows a amp Pro Report Queck Time Player QuckTour su Set Configuration a Skype 2 Soltaire SoloBug t Spider Solitaire ElspxSvr exe jum StetsReader 2 1 Zz La Path C Program Fles CDV Americas Centaur Cent os cancer F REFERE
205. operties Input Details Configuration Normally Closed y Enabling Schedule Always y Input response time 00500 ms Input restore time 00500 ms Bypass delay foooos s This input activates relay None This input bypasses input None Activates relay group Bypass input group None Manufacturing Access Control Since 1985 Relay Group 1 Relay 001 01 Relay 001 02 Relay 001 03 Relay 001 04 Relay 001 05 Activation Time set to 15 Activation Time setto 15 Activation Time set to 60 Deleting an Input To delete an existing input right click the input from the appropriate controller s branch in the Database Tree View window left hand portion of your screen and click Delete from the list You can also select the desired input and press the keyboard Delete key A dialogue box will appear requesting confirmation Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 13 Outputs What Will Find Overview of Output ProgrammMinQ oooccococ eens 126Adding Outputs 127 Modifyingran Output sa cries acest wanes A a anced aides ee aes aod oan take eii 127 Deleting an Output ie tho eek hha bei dae tate nlabbeddedediddl ides pidettanlll 130 Display Output Status and Manual Controls o oococccco tetas 131 Each controller includes six multi function outputs Each controller also s
206. operties window of the desired door select the General tab and set the Door Type to Elevator see Door Settings on page 71 Please note that you cannot use any doors from the 2 Door Expansion Modules for elevator control Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Elevator Control 3 Define when each floor of a door elevator cart is accessible to the general public no access card required In the Door Properties window of the desired door select the Elevator Control tab and assign a schedule to each floor see Floor Public Access Schedule on page 79 4 To access a floor when its schedule is invalid you must create a floor group and assign the floor group to the desired cards Expand the Groups branch within the Database Tree View window right click on Floor Groups and click New Floor Group from the drop down list You can also select Floor Groups and press the keyboard Insert key In the Floor Group Properties window select the Floors tab and assign specific floors to the floor group and then assign a schedule and an alternate schedule to the floor group see Floor Group s Floors and Schedules on page 143 5 Access the Card Properties window of a desired card by right clicking on the desired card and selecting Properties from the drop down list You can also select the desired card and press the keyboard Enter key In the Card window select the Card Holder tab and assign a floor g
207. ore starting the Centaur Service Manager otherwise the software will run in Demo Mode 1 From the Centaur server computer click Start gt Programs gt CDV Americas gt Centaur gt Centaur Service Manager The Centaur Service Manager window will appear 2 From the Centaur Service Manager window click the Start Continue button Once the Centaur Service Manager is running you can close the Centaur Service Manager window Note that when you start the Centaur Service Manager the Centaur software will automatically start the MSDE or SQL Server Centaur Service E o MSDE SQL Server Manager Service Manager The Auto start service when OS starts and Auto restart service when stopped check boxes in the Centaur Service Manager window are only available when Centaur is set as a service under Windows refer Setting Centaur as a Service Under Windows on page 9 To stop the Centaur Service Manager click Stop If the Operator Rights Validation window appears enter your Centaur Logon ID and Password and click OK The Operator Rights Validation window will not appear if Centaur is a service under Windows refer to Setting Centaur as a Service Under Windows on page 9 Manufacturing Access Control Since 1985 4 2 1d Using Centaur Pa Starting the Centaur Software 1 From the Centaur server computer or from a networked workstation click Start gt Programs CDV Americas gt Centaur gt Administration Console Administration Cons
208. orm the following to add a door 1 From the Database Tree View window right click the Doors from the desired controller and click New Doors You can also click the Doors and press the keyboard Insert key 2 Adialogue box appears requesting if you would like to use the Door Configuration Wizard The Door Configuration Wizard guides you through the minimum required settings to set up your doors If you want to use the Door Configuration Wizard click Yes and follow the steps detailed in Using the Door Configuration Wizard on page 68 If you do not want to use the Door Configuration Wizard click No and go to step 3 In the Add Devices window select the door address es and click OK After adding the door s you will have to configure them within the Door Properties window see Modifying a Door on page 69 Using the Door Configuration Wizard The Door Configuration Wizard guides you through the minimum required settings to set up your doors 1 When adding a door a dialog box appears asking if you would like to use the Door Configuration Wizard If you click Yes the Door Defaults window appears Under the Create heading select the check box next to the door address you would like to add From the Contact drop down list select the contact s zone input address If there is no contact associated with the door select None From the REX drop down list select the REX s zone input address If there is n
209. ormation Abnormal events Refer to Display Abnormal Events on 3 View gt Abnormal events page 164 for more information Acknowledged events Refer to Display Acknowledged Events on 4 View Acknowledged events page 164 for more information lt Status Door status El Refer to Displaying and Controlling the Status 5 View gt Door status of a Door on page 165 for more information Relay status 9 Refer to Displaying and Controlling the Status 6 View gt Relay status of a Relay on page 166 for more information Controller status 47 Refer to Displaying Controller Status on 7 View gt Controller status page 167 for more information Input Status Refer to Displaying and Controlling the Status 8 View gt Input status of an Input on page 168 for more information Output Status b Refer to Displaying and Controlling the Status 9 View gt Output status of an Output on page 169 for more information Manufacturing Access Control Since 1985 CATEGORY Modules About KEYBOARD card enrolment station About BUTTON DESCRIPTION SHORTCUT MENU Open FontCard amp Refer to Centaur Card Management Feature Ctrl F1 Module gt FrontCard on page 96 for more information Open Card Import Export so Refer to Centaur Card Import Export Feature Ctrl F2 Module gt Card import Export on page 102 for more
210. orrect and click Find Now Select the desired user from the list Hold down the keyboard Ctrl key to select multiple users Click OK The Centaur Group appears now in the Select Users or Groups window Click OK Select Users or Groups Select Wis obisot Woe Users Groups o Bult n securty principals L 11 Click OK 12 From the taskbar click Start gt Control Panel gt Administrative Tools gt Local Security Policy Manufacturing Access Control Since 1985 The Local Security Settings window will appear Double click DCOM Machine Access Restrictions in Security Descriptor Definition Language SDDL syntax a Account Poicies ia Accounts Guest account status GB Local Poldes Rl Accounts Limit local eccount use of blank passwords to console logon only El Audit Policy a Accounts Rename administrator account Br User Piok AmaE fil Accounts Rename guest account QQ searity Options E ES Public Key Policies E Software Restriction Poldes le 3 IP Security Polaes on Local Re Devices Allow undock mthout having to og an ie Devices Allowed to format and eject removable media ig Devices Prevent users from instaling printer drivers EE Devices Restrict CD ROM access to locaby logged on user only The DCOM Machine Access Restrictions window will appear Click Edit Security DCOM Machine Access Restrictions in Security Descri PR Template Security Policy Setting DCOM Machine Access R
211. orting Cards A If the site you are importing the cards into already contains cards that are also in the csv file errors may occur 1 After starting Centaur Card Import Export feature click Next 2 Select Import Cards click Next and click Next again 3 Select the site that you want to import the card data into and click Next 4 Type the name of the csv file that you want to import or click the button to select a file name and location Click Next 5 Select a delimiter that separates the card data fields in the selected csv file If the csv file contains a colon delimiter between the family and card number select the Use delimiter for Family Card number check box If the csv file contains field names in the first row select the First row contains field names check box If the csv file contains hexadecimal family numbers select the Hex Family number check box Click Next 6 Select the default access levels and floor group you wish to assign to all the imported cards and click Next These can be changed afterwards 7 Items in the bottom list box represent data fields that will be imported into the selected site Highlight the desired data fields from either list box and click the Add and Remove buttons until the desired data fields appear in the bottom list box Click Next 8 You can click Preview to review the data fields that will be imported into the selected site Click Finish when you are done A message appears indic
212. ou can also select multiple relays to manually change in the same way by clicking on the relays while holding down the Shift or Ctrl keys and right clicking on one of the selected relays A drop down list will appear Select one of the following actions from the list Also refer to Figure 36 on page 167 Activate Relay Activates toggles the selected relay for the period specified by the relay s Activation Time see Setting the Relay Activation Timer on page 112 If a relay s Delay on Activation Time is programmed see Setting the Relay Delay Time Before Activation on page 112 the relay will only activate after this delay has elapsed Activate Relay Timed Activates toggles the selected relay for a programmed period of time When you select this action the Activation Time window will appear In the Time seconds text box type a value from 1 to 9999 seconds and click OK Activate Relay Latched Activates toggles the selected relay until an operator deactivates the relay using the Deactivate Relay manual command see Deactivate Relay on page 166 or until deactivated by the relay s schedule see Selecting a Time Relay Activation Schedule on page 111 Deactivate Relay Deactivates the selected relay Manufacturing Access Control Since 1985 m3 REFERENCE MANUAL CENTAUR 4 2 Figure 36 Display Relay Status Click the Relay Status icon I Centaur Relay Status Visual displa
213. owse button choose the folder destination and click OK Click Next The Centaur software is installed by default to C Program Files CDV Americas Centaur The Centaur Pre Requisites window will appear Setup automatically detects and lists which prerequisites have and have not been installed on your computer To install the required software components click Next and follow the on screen instructions If you already have all prerequisites Setup will skip this step continu with next step When Setup has completed the installation of the Centaur software the InstallShield Wizard Complete window will appear Select if you wish to restart your computer now or later Click Finish Before you can use the Centaur software you must restart your computer An icon for the Administration Console Workstation is automatically added to your computer desktop The Centaur software manuals are automatically installed on your computer To locate a software manual click Start Programs CDV Americas Centaur Administration Console and Manuals The Centaur hardware manuals must be manually installed on your computer To locate the hardware manuals on the CD open Windows Explorer Click on the appropriate drive indicator x from which the Centaur CD is running Double click the Manuals folder Double click the Hardware Manuals folder Copy and paste the manual s to the computer drive and folder of your choice Manufacturing Access Control Since 198
214. perator assigned with this security level will be able to view and delete any of the site s cards All Click the All button to select all the View Modify and Delete check boxes of every system characteristic None Click the None button to clear all the View Modify and Delete check boxes of every system characteristic Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Operators E Setting the Security Level s Manual Operation From the Security Level properties window select the Operations tab to define which manual actions see Manual Controls on page 163 that the operator can perform You can also define whether an operator can acknowledge alarms and whether they can acknowledge all alarms see Alarm Acknowledgement on page 137 To allow operators to perform actions detailed above select the check box associated with the desired Security Level Security Level Database Operations I Controller Operations I Door Operations TF Input Operations operation TF Output Operations T Relay Operations Permissions I Acknowledge Alams I Acknowledge All Permissions determine which sites the operator is authorized to access and the operator s security level for each site Permissions are then assigned to operators see Operators on page 152 Assigning Security Levels to a Permission Each site in the permission can be assigned with a different security level Operator Per
215. presented refer to Access Level on page 92 Selecting Extended Access Levels Levels 3 4 check box will allow to extend to up to four card access levels The extended access levels feature requires firmware R2 C3 68 in order to function correctly Manufacturing Access Control Since 1985 Selecting the Cards Maximum Family Number Each access card has a unique number consisting of two parts The Family Number is always the first part of the number and is usually followed by a colon e g 247 1234 and the card number The family number can be found printed directly on the card or written on a cross reference sheet From the Maximum Family Number drop down list select the appropriate value as detailed below Table 1 Selection of the cards maximum family number MAXIMUM FAMILY NUMBER VALUE LENGTH OF THE FAMILY CODE fo No family code 255 Family code at 1 Octet 65 535 Family code at 2 Octets 16 777 215 Family code at 3 Octets 4 294 967 295 Family code at 4 Octets Selecting a Site s Global Anti Passback Reset Schedule In the Global Anti passback reset schedule list select the schedule that will reset the global anti passback status of all card holders to unknown This applies only to doors set as Global Entry or Global Exit see Global Entry or Global Exit on page 71 and does not apply to the local anti passback status of the controller see Controller Anti passback Settings on page 6
216. program any items without connecting to the site you must download the system characteristics to the controllers the next time you connect e If you wish to download a particular characteristic to a specific controller in a site program the desired characteristic without connecting then connect and download to the desired controller Downloading to One Controllers 1 To download to one controller in a site from the desired Site right click a controller from the Controllers 2 From the drop down list select Download 3 Click All or only the specific programming item you wish to download i e doors Please note that download time depends on the size of the database Downloading 20 cards will take less time than 3 500 cards Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Controllers par Other Controller Management Options The following controller management options are also available when you right click a controller within the Controllers of a desired site Updating the Controller Time The Centaur software can update the date and time of one controller or all controllers in a site To do so right click a controller from the Controllers of the desired site and click Update Time In the Date Time window type the required date and time If you wish to update all controllers in the selected site select the Update all controllers on this site check box Click OK Also refer to Updating the Con
217. ption The set of network protocols available to DCOM on this machine The ordering of the protocols reflects the priority in which they will be used with the top protocol having first priority Cancel Apply Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration pm 4 Inthe MSDTC tab check if the Service Control Status for MSDTC is running ly Computer properties AN ax i Baers Options Default Properties Default Protocols MSDTC COM Security Def TRE Aaea lsereesertesneereenenennsenseenteseneenerense g Remote Host Select Log Information Currently owned by 2K3R2SP2 VIRT Location CAWINDOWS system32 MSDte Browse Capacity p MB Reset log Client Network Protocol Configuration TCPAP y Service Control Status for MSDTC version 5 2 3790 2825 Status Started at 14 15 46 2007 10 15 Start Stop Transaction Configuration Tracing Options Security Configuration Tracing Options cme n Manufacturing Access Control Since 1985 F ATT i REFERENCE MANUAL figuration 5 Inthe Default Properties tab check if the Enable Distributed COM on this computer check box is selected My Computer Properties 2 xi Default Protocols MSDTE COM Security General Options Default Properties RRE RAS ERRE ERE TOS ORT J Enable COM Internet Services on this computer Default Distributed COM
218. puter refer to DCOM Configuration on page 183 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Installing and Using Centaur E a Centaur Administration Console Workstation This section describes how to install a Centaur Administration Console on a networked workstation The Centaur Administration Console is installed on a networked workstation computer using the Centaur 4 2 CD The Centaur Administration Console allows operators to monitor and manage the access control system remotely by accessing the Centaur Server s databases and its controllers through a network A In order for a remote workstation to access the Server DCOM must be configured on the Centaur Server computer refer to DCOM Configuration on page 183 Computer Requirements Workstation The Centaur software is designed to operate with IBM or IBM compatible computers running a suitable Microsoft Windows operating system as detailed in the Operating System Requirements below Pentium 4 e 512MB RAM 1GB for superior performance e 300MB free disk space e Super VGA Monitor Operating System Requirements Workstation The Centaur Administration Console has been tested on the following operating systems Windows XP Home or Professional Edition English and French Service Pack 2 e Windows 2003 Server Edition English and French e Windows 2000 Professional Edition English French and Spanish e Windows 2000 Se
219. r online help WavePlayer This Centaur feature is designed to enable a wav file to be played on the computer when an event that requires acknowledgement occurs The sound can replay at programmed intervals until the alarm is acknowledged For more information refer to Centaur Wave Player on page 181 Pro Report This module features a user friendly wizard for generating system reports Generate quick one time pre defined and scheduled reports for up to 10 different report types You can also search group and sort your reports For more information refer to Centaur s ProReport online help FrontView The real time graphic interface gives you point and click control over doors relays inputs outputs and controllers through a graphical floor plan For more information refer to Centaur s FrontView manual Diagnostic Tool The Diagnostic Tool allows you to view your system information to ensure all of the components required to run the Centaur software have been installed Within the Diagnostic Tool s menu you may save or copy your system information to a specific folder on your computer or send it directly to our technical support team in the event that you require assistance This tool is also helpful in assessing which prerequisites your computer may require when upgrading to the latest version of the Centaur software Manufacturing Access Control Since 1985 4 2 1d Using Centaur Manufacturing Acc
220. r Access Control System through the Centaur software Each operator authorized to access the Centaur system can be defined with different permissions and security levels Security levels determine whether an operator can view modify and or delete system characteristics The system characteristics consist of all the elements found in the Database Tree View window such as controllers doors and events After creating a security level the security level is assigned to a permission and the permission is assigned to an operator Manufacturing Access Control Since 1985 Overview of Operators Operators are personnel authorized to interact with the Centaur Access ic Control System through the Centaur software Each operator can be SETE defined with different permissions and security levels To create an E EIEE ga operator you must set up the following items in the order specified below ar i A si e Security levels determine whether an operator can view modify T l a lanufacturing Plant Montreal and or delete system characteristics and whether the operator can E Cards perform manual controls such as locking and unlocking doors a e Levels remotely The system characteristics consist of all the elements id eo found in the Database Tree View window such as controllers Controllers doors and events For more information refer to Security Levels i N OUPS a on page 150 Security levels are then assigned to a pe
221. r is displayed when you have selected to Load the selected template i J Menu 7 Centaur Card Template Designer ES L File Edit Card Settings View Help BSaamtea Toolbar Sa EEK Back Side First name Front Card Badge Last name Back Card q Badge Company Status Bar Ready Num Manufacturing Access Control Since 1985 A PJ REFERENCE MANUAL Menu The menu gives access to the File Edit Card Settings View and Help menus The File menu gives access to the Template selection Save Print and Exit e The Edit menu gives access to the following to add items to the template For each item selected click on the screen where the field needs to be located Click and drag the inserted field to change its location on the badge Add Photo Allows to add the photo to the badge template Add Card Info Allows to add predefined card fields from the Card Holder Details on page 91 and Typing Additional Card Holder Details on page 94 Select a field from the Card Data drop list and click OK Add Static Text Allows to add static text to the badge template Add Barcode Allows to add a barcode The Card Settings menu gives access to the following Background Images Allows to add a background image to the badge template Select the background image for the Front and or the Back of the badge and click OK Default Font Allows the selection of the font that will be used for the card fields inser
222. re Modules 152 Monitor CCTV Command 157 MSDE Management See also Database Backup Scheduler A PJ REFERENCE MANUAL N Name Access Level 84 Controllers 54 Doors 70 Holidays 40 Outputs 128 Relays 111 Schedules 45 Security Level Permission or Operator 149 NC Input Connection 176 NC Inputs 57 Non activated Status Relays 113 None Security Levels 150 Normal State NO NC Inputs 121 Notes Access Level 84 Controller 54 Doors 70 Holidays 40 Outputs 128 Relays 111 Schedules 45 Security Level Permission or Operator 149 O Offline Buffering 32 Open Too Long Time 74 Opened Reading Type 73 Operating system requirements 7 Operations Tab Security Levels 157 Operator Timeout 17 Operators 147 152 Options 17 159 Alarm Acknowledgement 160 Events 160 Status Display 161 Options Cards 93 Outbox 32 Output Activation 78 Output Programming 126 Output Properties Activation Time 128 Events Tab 128 Inverted 128 Output Tab 127 Output Status 131 169 Output status 17 Output Timing Properties Timings 130 Outputs 125 Override Anti passback 93 Override Interlock 93 Overview of Output Programming 126 P P LN 93 Generate Unique 33 Password Setting the Operator s Access Rights 152 Pending Cards 94 Periods 45 Photo 95 Poll Door Expander Status Non Stop 67 Poll Timeout 59 Port Number 57 Pre alarm Time 74 Preset CCTV Command 157 Print Card Information Centaur s Card Management feature 97 Print the c
223. re the input In the Input response time text field type a value from 0 to 65535 ms 65 5 seconds Please note that once an input is in alarm input is triggered for the duration of Input Response Time another alarm won t be generated until the system registers the input as normal or restored see Setting the Input Restore Time on page 121 Example The Input Response Time is set for 600 ms and an input is triggered but is restored in less than 600 ms The controller will not respond i e no event generation no alarm etc Setting the Input Restore Time The Input Restore Time defines how quickly the controller will respond to the restoring of an input in alarm If the input remains restored in its normal state for the period defined by the Input Restore Time the controller will log the Input restore normal event and react according to its programming This only occurs if the input has already generated an alarm see Setting the Input Response Time on page 121 In the Input restore time text field type a value from 0 to 65535 ms 65 5 seconds Bypassing Inputs with an Input When an input is triggered the controller can be programmed to bypass another input or a selected group of inputs Also refer to the example demonstrated in Figure 28 on page 122 1 From the This input bypasses input drop down list select which input will be bypassed upon triggering of the input 2 From the Bypass input group drop down list
224. rectly on an access card first define the card badge and click the Print the card on an access card button Refer to Defining Card Badge on page 98 for more information Print Card Information on Paper To print the card information on paper click the Print Card Information on paper button and click OK from the print window Refresh To update the list of cards with any cards that may have been added to the database using another method click the Refresh button CMPP To load or add a card using a CMPP card enrolment station click the CMPP button Manufacturing Access Control Since 1985 REFERENCE MA 2 4 2 Search To search for a card using specific criteria Click the Find Card Record icon binoculars The Find Card window Find Card appears From the Field drop down list select the desired criteria The criteria that can Find be selected are as follows Family Number Card Number PIN Number Field Last Name y First Name Last Name Company Card Number Hex or any of the text fields found in the User Defined Data tab In the Find text field type the text that Centaur card management software will search for The text should be representative of the criteria selected in step 2 If you want the search to match exactly what is typed in the Find field select the Exact match check box Click the Find button From the Results list highlight the desired card and click the Go to button to
225. ress the keyboard Enter key You cannot modify the default Administrator General Properties for Security Levels Permissions and Operators From this window select the Security Level Permission or Operator tab This will allow you to view some of the system s component addresses as well record the name and any additional notes Viewing the Security Level Permission or Operator s Address At the top of the Security Level tab Centaur will display the selected site s address as well as the address of the selected security level The first security level created is assigned Security Level 3 as its address Every time a security level is added Centaur increments the item s address by one Addresses 1 and 2 are reserved for the All and None security levels At the top of the Permission and Operator tab Centaur displays the address of the selected permission or operator The first permission created is assigned Permission 3 as its address and the first operator created is assigned Operator 3 as its address Every time a permission or operator is added Centaur increments the item s address by one Permission addresses 1 and 2 are reserved for the All and None permissions and operator address 1 is reserved for the Administrator operator Typing the Security Level Permission or Operator s Name In the Name text field type a descriptive name for the security level e g Level 1 permission e g System
226. resse s In the To Cc and Bcc text fields type the E Mail address es of the user s that you wish to send the E Mail to Only one E mail address per field is supported Typing the Message for the Selected Event In the Message text field type the content of the E Mail message that you wish to send to the operator This message will be sent to all the operator s defined in the To Cc and Bcc field E Mail addresses when the event occurs and the schedule is valid For this feature to work Microsoft Outlook 2003 must be installed and configured on the Centaur server Only one E Mail per field is allowed not possible to use to separate E Mail addresses Manufacturing Access Control Since 1985 REFER Event Activated CCTV Control After selecting an event as described in Event Definition Overview on page 134 click the CCTV Control tab in the event s properties window to program the CCTV settings for that event To Settings for Default Z General Alams EMail CCTV Cortial activate CCTV control for a site refer to Site CCTV Port Settings Front Door on page 36 To program CCTV commands refer to CCTV E eaa Commands on page 155 Access granted I SendASCII Command Schedule Never Command CCTV Command 001 Enabling CCTV Control for an Event Protocol iz Select the Send ASCII Command check box to send a CCTV command to the connected video switcher whenever the selected event occ
227. ring Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Controllers Cont Add Table 3 Assigning Controller Addresses Via Dip Switches OFF OFF OFF OFF OFF OFF 33 OFF OFF OFF OFF Controller Dip Switches Cont Controller Dip Switches 1 2 4 7 8 16 32 Add 4 2 4 8 16 32 OFF ON ON OFF OFF OFF OFF OFF 34 ON 35 FF OFF OFF OFF OFF ON Manufacturing Access Control Since 1985 a REFERENCE MANUAL Figure 9 Overview of Controller Programming k Centaur All Events Access Castrol Spitees SERVER RS485 Converter CA A360 USB h dli Address 1 ADORESS 32 ADORESS 14 ADORESS 8 ADDRESS 4 Typing the Controller Name Use the Name text field in the Controller tab to identify the controller s use or location We recommend using name that is representative of the controller such as Main Entrance Also refer to Typing Names and Notes on page 22 Typing the Controller Notes Use the Notes text field in the Controller tab to record any additional notes that may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 22 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4
228. rkstation computer you will be asked to select one language The Administrator Console will display the item names and notes in the language selected from the Administrator Console s login window Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 4 2 Access Control Software e 2 Access Control Systems Chapter 3 Sites What Will Find Adding a SING Li A A a oie ay te a Ree cite Sk aie Hele ke a ak anes 24 ModiYINg a SILC alas ie o a aa noe OS We Rte d iia Doda ena Se 27 Deleting a SMS dine ti a a A dt ll lr ad 38 Communicating with a Site o o o oooooooo tn en ete eee 38 Each site can monitor and operate a specific number of cards controllers inputs relays and multi function outputs depending on the Centaur software edition being used The first step in setting up your system is creating and defining your sites Once your sites have been defined you can begin programming the remaining items such as controllers cards schedules and doors In the Sites branch local sites will be represented by a traffic light icon remote dial up sites will be represented by a telephone icon and TCP IP sites will be represented by a network icon depicting five computers Manufacturing Access Control Since 1985 Fe REFERENCE MANUAL Adding a Site Perform the following to add a site 1 4 Using The site configuration wizard guides you through the minimum required From the
229. rmission i 4 ae TE Program a security level and n 2 A 5 9 All assign it to a permission Permissions determine which sites the operator is authorized to None access and the operator s security level for each site For more S Secte Level 003 Program a permission and information refer to Permissions on page 151 Permissions are 1 ea assign it to an operator then assigned to an operator T 9 p oe Program an operator Operators determine who can access the Centaur software to Permission 003 program and monitor the access control system Define the login ID eG i ministrator and password assign a permission and select which software operas one modules will be accessible For more information refer to 4 Ek CCTV Commands Operators on page 152 Centaur includes two default security levels and two default permissions All and None which cannot be modified or deleted The All security level and permission enable you to program view and delete any system characteristic The None security level and permission will deny any access to all system characteristics Unlike security levels the permissions are not programmed per site instead they apply to the entire access control system Centaur includes one default operator Administrator which cannot be modified except for its logon ID and password or deleted The Administrator has full access to all system characteristics in all sites Adding a Security Le
230. rollers ii asi 50 Modifying a Controller acusada raid a AR 52 Deleting a Controller vita ia A des 62 Online Controller Firmware Upgrades oconccinccninccnnninnccnncnoncnan ocn 63 Download cotos id ns 64 Other Controller Management Options ooooncccncnnncnnnccnnconnncanancn rca 65 A ces E oe ed Se Ss waned E saskuas anes sacuussanuauapen sousnsssaneuseaversecsucreasiauo 67 AGING DOES is pd 68 MOdIY IND a DO abia ao oie 69 Deleting a DOON vincia de tai garden da laa a Ea Eaa Eaa ai e A 80 Display Door St t s caricia strict a leeis 81 ACCESS LEVELS siii ie 83 Adding an Access Level conmicicnncnncicncnnnccnnnnn nc 84 Modifying an Access L Vel iii Le a ee ed ceeds 84 Deleting an Access Level ececceeeceeseceeeeeneeeeeeeeseeesaeceaeecseesaaeesaeesaaeseaeesaaeseaeeaeesaaeseaeesaeeseaecseesaeseaeeseaeeeaeesiaeseaeeeeeseaeeseaeseaeenea 86 Manufacturing Access Control Since 1985 A PF REFERENCE MANUAL CARDS lt a eiii 87 Adding GAS ic da e A A E a O iaa 89 Modifying Cardi sica aaee naene ea ini ce dde di a de 91 Deleting a Gard ia nadie eet ad en ee te ee i ee 95 Centaur Card Management Feature eecceeceseseceneeceeeeeeeeeeeseaeeeaeeeseeeceeesaeesaeeseaeseeesaeesaeseaeeseeeseaeeseeeseaeesneeseaeesieeseaeesieeeneeenaes 96 Centaur Gard Import Export Feature cinc es 102 ELEVATOR CONTROL uu A tet 105 Overview of Elevator Control ccceecceeeseeeseeeeceseeeeeeeeesaeeeaeeseaeseaeecaeeseaeeaeeseaeeeaeessaesaeesse
231. rosot Management Console Dolay a neeticaton when Windows Frewall blocks a program Wh lt From the Exceptions tab click Add Program Add a Program ig tto E Programs E PQBoot for Windows amp Pro Report Q GuckTime Player Quick Tour 88 Set Configuration O sepe i Soltaire y Spider Solitaire EspxSvr exe mm StetsReader 2 1 F Lam Path C Program Files CDV Americas Centaur Cent CE Co C F REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration 3 The Add a Program window will appear Click Browse and select the spxsvr exe file located by default in C Program Files CDV Americas Centaur Centaur Server and click OK Manufacturing Access Control Since 1985 SEE i REFERENCE MANUAL iguration 4 The Windows Firewall window will re appear From the Exceptions tab make sure that the spxsvr exe check box below the Programs and Services heading is selected 5 From the Exceptions tab click Add Program The Add a Program window will appear Click Browse and select the sqlsevr exe file located by default in C Program Files Microsoft SQL ServerMSSQL Binn and click OK Windows Firewall General Exceptions Advanced Windows Frewal is tuned off Your computer is at risk of allacks ard intrusions from outside sources such as the ktemet We recommend that you cick the General tab and select On Programs and Services N
232. roup to the card see Card Holder Details on page 91 Figure 21 Example of Elevator Control Door 1 for Door 2 for s Elevator Car 1 Elevator Car 2 DIP switch settings on elevator controller determine floor assignment of its relays Door 1 Elevator Car 1 Floors 1 to 16 Door 2 Elevator Car 2 Floors 1 to 16 To other CT V900 A controller Button SB2 for floor 1 RS 485 Button SB1 for floor Button G for floor 3 Button 1 for floor 4 Not used Button S81 for floor 2 Button G for floor 3 Button 1 for floor 4 Button 2 for floor 5 Button 3 for floor 6 Button 4 for floor 7 Button 2 for floor 5 Button 3 for floor 6 Not used Button 5 for floor 8 Not used 5 Fifth Floor Logical Floor 8 wrote SO 3 Third Floor 2 Elevator Car 1 Logical Floors 1 to 8 G General Floor SB1 Parking Level 1 SB2 Parking Level 2 Logical Floor 1 Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 11 Relays What Will Find o A Hae ee Awe a a Wey nw rt eee Ree Ea GM hd Aaa ses Welle tee vee ag wc a ase 110 Moditying a Relay std ols suet Gis a eats oie E ta ia Bae env te area le as 110 Deleting a Relay 2 5 cinch ad nd dl dent ih eae hth EE ee dhe 113 Display Relay Status and Manual Controls The CA
233. rrent card For Delete tie Current gard e more information on the settings available in these Add new card Refresh card tabs refer to Card Holder Details on page 91 See CNPP Defining Card Badge on page 98 for more stol rough information on the Badge tab Search card Cards are sorted by last name or by card number depending on the option selected when starting the card management feature from Start Programs CDV Americas Centaur Administration Console and FrontCard ED Cord Holder A3 User Doned Dala id Photo 8 Baoe Scrolling Through the Site s Cards Lot Name Porn Card Number HEX 0000360002 Click the scroll buttons 4 4 gt Pl to Frat Name Eomans Fandy Number 90190 scroll backward or forward through the LCD Display Name E4 Jobs LS pa cards available in the selected site Compery Nome Pm conn Floor Group None w Add a New Card o m adn To create a new card click the Add new ES card record button program the card s ET Arfcaback Onda settings and click the Save Changes button F iriedock Oveside Gl am 3 r Delete A Card To delete the currently selected card click the Delete card record button Save Changes To save any changes made to the currently selected card click the Save Changes button W Undo Changes To undo any changes made to the currently selected card click the Cancel changes button Print the Card on an Access Card To print di
234. rver Edition English French and Dutch Other software requirements available on the CD e DCOM e MDAC 2 8 Microsoft Internet Explorer version 6 0 or higher Acrobat Reader 6 0 or higher e XML 3 0 Parser Manufacturing Access Control Since 1985 4 2 1d Using Centaur Pa Installing Updating the Administration Console Workstation This section describes how to install or update the Centaur Administration Console Workstation 1 2 3 D p Insert the Centaur 4 2 CD into the computer s CD ROM drive If the auto run feature is enabled go to the next step Otherwise click Run from the Start menu type the appropriate drive indicator x followed by setup exe or click Browse to search for the setup exe file Click OK The Centaur Setup window will appear If this is a new installation of the Centaur software click Next and go to the step 4 To update previously installed Centaur software select Update click Next follow the on screen instructions and click Finish The License Agreement window will appear To install the Centaur software select accept the terms of the license agreement and click Next The Type of installation window will appear To install the Administration Console Workstation select System management only will not communicate with control panels Workstation only If you wish to select a different folder destination for the Centaur software click the appropriate Br
235. s Help ard Support dae Teskbar and User Accounts MIA Wreless Start Menu AGEE Network Set 2 The Control Panel window will appear Double click on the Windows Firewall icon Manufacturing Access Control Since 1985 LSE z REFERENCE MANUAL 4 2 figuration The Windows Firewall window will appear From the Exceptions tab click Add Port Windows Firewall General Exceptions Advanced Windows Frewall is tumed off Your computer is al cek of atlacks and intrusions kom outside sources such as the intemet We recommend that you cick the Genera tab and select On Programs and Services Name rtemet Explorer Wi Java TM 2 Platform Standard Edtion binary Maresa Management Console WM Remera Aasstarce D Renate Desktop F Skye DUP Freenework Windows Live Messenger 8 0 Phone Windows Live Messenger 8 1 MW Windows Live Messenger 8 1 Phone vY Add Progam Add Port em Deme 7 Display a notfication when Windows Firewall blocks a program Wher ore the nsits of lona excenpons The Add a Port window will appear In the Name field enter DCOM In the Port number field enter 135 Select TCP as your communication type and click OK Add a Port Use these settings to open a port throuch Windows Firewall To find the port number and protocol consult the documentation for the program or service you want to use DCOM 1135 TCP What are the risks of
236. s 160 On All Events 160 bling 84 Buffering Offline 32 Bypass input group 127 Bypassing Inputs 121 Cc Camera CCTV Command 157 Card Fields 32 Card Import Export 13 18 153 Card Number 97 Card Number and Card Number HEX 92 Card Options 93 Card Settings 97 Card Status 94 Card Traced 93 Card Distributed Programming 33 Cardholder Details 94 Cards 87 Photo 95 CCTV Command Properties General Tab 156 CCTV Control Enabling for an Event 140 Protocol 140 Schedule for an Event 140 CCTV port settings 36 Centaur Card Import Export Feature 102 Centaur Database Management Tools 171 Centaur Databases 172 Centaur Editions 2 Centaur Service Manager 153 Centaur s Anti Passback Monitoring Software 153 Centaur s Card Management feature 96 Centaur s Real Time Graphic Interface Feature 153 Centaur s Report Generation feature 153 Centaur s Visual Authentication Software 153 CMPP card enrolment station 37 CMPP Module Centaur s Card Management feature 97 Colour Definitions Events 161 COM Port Assignment 30 Command CCTV 140 Communication 22 Baud Rate Setting 30 COM Port Assignment 30 Controller Options 57 Dialup 28 Direct serial port 27 Phone Number 31 Speed 30 TCP IP 29 Update CTL Every 15 Minutes 32 Communication Type 24 Computer requirements 7 Configuration Tab Controllers 55 Configuring Doors 55 61 Configuring Inputs 57 127 Connecting and Disconnecting 35 Connecting Inputs 116 Control Input Status 168 Con
237. s are used refer to Cards on page 87 A In order to program the access levels you must first program the Sites on page 23 the Doors on page 67 and Schedules on page 43 Manufacturing Access Control Since 1985 Adding an Access Level To add an access level right click Access Levels in the desired Site branch and click New Access Level from the drop down list You can also click Access Levels and press the keyboard Insert key to add an access level After adding an access level the Access Level Properties window will appear allowing you to configure the access level See Modifying an Access Level for more information Modifying an Access Level From the desired Site branch in the Database Tree View window right click the access level you wish to modify and click Properties from the drop down list You can also select the desired access level and press the keyboard Enter key You cannot modify the default All and None access levels General Access Level Properties From the this window select the Access Level tab This will allow you to view some of the system component addresses as well record the access level name Access Level Properties and any additional notes Access Level Doors and Schedules Site 1 Access Level 5 Active Viewing the Access Level Address Name csessLevei3 At the top of the Access Level tab Centaur displays the selected site s address as well as the address of th
238. s in different locations with different names and using different schedules Perform the following to run Centaur s database backup scheduler and create scheduled job 1 Make sure the SQL Server is running see Starting the Centaur Server and Software on page 11 2 Click Start T MSDE Management Console Programs CDV File View Help Americas Centaur 1S Bl z Administration Console and click Schedule MSDE Management backup A button Console or directly from within Centaur click the Open Database Backup Scheduler icon from the main menu bar Choose the language from the pop up window click OK and the MSDE Management Console window will appear Server Databases Y Centaur3Main y Centaur3Events Management A SQLServer Agent Next run date and time 3 Click the Schedule backup button from the main menu bar The Create Database Backup Wizard window will appear Ready 02 03 08 17 57 18 4 Click Next 5 From the Database drop down list select the database you would like to backup For more information refer to What are the Centaur Databases on page 172 Click Next Manufacturing Access Control Since 1985 9 REFERENCE MANUAL CENTAUR 4 2 Database Management E s In the Name text box type the job name of the scheduled backup In the Description text box type the description of the backup Click Next In the Select backup file t
239. selected schedule is valid Also refer to Schedules on page 43 For this feature to function you must enable alarm acknowledgement see Enabling Alarm Acknowledgement on page 137 Typing the Instructions for the Selected Alarm In the Instructions text field type the instructions or warnings that you wish to provide to the operator These instructions will appear in the Alarm window when the event occurs and the schedule is valid For this feature to function you must enable alarm acknowledgement see Enabling Alarm Acknowledgement on page 137 Manufacturing Access Control Since 1985 APR REFERENCE MANUAL Acknowledging Alarms The following details how an operator can acknowledge an alarm 1 If the event meets the programmed criteria see Alarm Acknowledgement on page 137 the event and its programmed instructions appear in the Alarms window To play a sound file every time the event occurs refer to Centaur Wave Player on page 181 2 The operator can acknowledge one event and type any comments or the operator can acknowledge all events without providing any comments To acknowledge one event right click the event in the Alarm window and select Acknowledge from the list Go to step 3 To acknowledge all events right click any event in the Alarm window and select Acknowledge all from the list Go to step 4 3 The Acknowledge Alarm window appears Type any comments in the Comments text field and cl
240. ssign the holiday group to a separate new period Set the start and end time but do not select any of the day check boxes Sun to Sat Deleting a Schedule To delete an existing schedule right click the schedule from the Schedules and click Delete You can also click the desired schedule from the Schedules and press the keyboard Delete key A dialogue box will appear requesting confirmation You cannot delete the default Always and Never schedules You cannot delete a schedule assigned used in other parts of the system such as access levels door schedules etc Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 6 Controllers What Will Find Adding Gontrollers a0 casi ll ad ae ee bebe DA O A E e bak aie Welle ed gees AA 50 ModifVing a Controle RA A ais oR ane a bie able Seal AA Rode Nog eee eS ae ees 52 Deleting a Controller ss tie ce atodos a bid bs debate de id bbb dd bol 62 Online Controller Firmware Upgrades 0 0 ccc nent tenes 63 A ela Oe Gene da Gn eee ae die ware et oe ee ee eae Peed oad ee ee aha oa tes 64 Other Controller Management Options 0 0 0 c cette tte eee 65 Controllers are the heart of the Centaur access control system The database is distributed to all controllers allowing them to make decisions in a fraction of a second whether or not the managin
241. stem32 gt msdtc unistall 3 Reboot your computer 4 From the taskbar click Start gt Run The Run window will appear Enter cmd in the text box and click OK Type the name of a program folder document or i Internet resource and Windows will open it for you en cmd Ms ip Cancel Browse 5 The CAWINDOWS System32 cmd exe window will appear Type cd systemroot system32 and press the keyboard Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration moa Enter key Type msdtc install and press the keyboard Enter key ca Select C WINDOWS system32 cmd exe Ft Windows P Ver right 1985 2661 M ocument ca systemrootz system32 WINDOW Manufacturing Access Control Since 1985 N REFERENCE MANUAL Verifying if the DCOM has been repaired Perform the following steps to verify that DCOM has been repaired 1 From the taskbar click Start gt Run The Run window will appear Enter dcomcnfg exe in the text box and click OK Run ta 5 Type the name of a program folder document or 7 Internet resource and Windows will open it For you Open dcomenfal X The Component Services window will appear In the Console Root folder left side of your screen expand the Component Services branch the Computers branch and the My Computer branch If there is a red arrow next to any of the components of this folder DCOM has not been
242. such as Production Schedule Also refer to Typing Names and Notes on page 22 Typing the Schedule Notes In the Notes text box record any important explanations of the schedule and its use Try to keep an up to date record of where the schedules are used This will help you understand how disabling the schedule will affect the system Also refer to Typing Names and Notes on page 22 Schedule Periods Each schedule consists of up to eight periods and each period defines when the schedule will be valid Each period can be programmed with a different start and end time Use the check boxes to define which days of the week and Schedule Properties Schedule Details which holiday groups will be used for each period To define a schedule period Stat End Sun Mon Tue Wed Thu Fri Sat Holl Hol2 Hol3 Hol Period 1 ooo r 1 From the Schedule Properties window select the Details tab Period 2 0000 foooo Period 3 0000 0000 2 Inthe desired period Start and End text fields type the period start m i a and end time using the 24Hr clock For more information refer to oo Ta Setting the Period Start and End Time on page 46 noe foso aos Period 8 0000 0000 3 Select the check box es corresponding to the day s of the week you wish to assign to the schedule The schedule will only be valid during the days of the week that have been selected and only at the times specified by the start and end times 4 To ass
243. supports four elevator controllers for up to 64 floors Each door in a site represents an elevator cart and each one controls the same floors defined by the site Figure 20 Basic Overview of Elevator Controllers Door 1 Door 2 Elevator Cart 1 Elevator Cart 2 Up to 4 Elevator Controllers Elevator Controllers CA A480 A per door CA A480 A DIP Switch Floors Floors Floors 17 to 32 33 to 48 To other CT V900 A controller RS 485 For Door 1 Addressable DIP Switch Quick Start Programming To properly set up Centaur for elevator control several different elements must be programmed as defined here 1 Access the Site Properties window by right clicking on the desired site from the Database Tree View window and selecting Properties from the drop down list You can also select the desired site and press the keyboard Enter key In the Site Properties window select the Floors tab and define the names and numbers of the site s logical floors see Site Floor Settings on page 35 2 Program the door s reader for elevator control and install it inside the elevator cart The door cannot be used for any other purpose other than elevator control Access the Door Properties window by right clicking on the desired door from the desired controller s branch within the selected site and clicking Properties from the drop down list You can also select the desired door and press the keyboard Enter key In the Door Pr
244. t connected to the selected COM port Flow control determines the timing of signals and enables slower speed devices to communicate with higher speed devices There are various techniques but all are designed to ensure that the receiving station is able to accept the next block of data before the sending station sends it Manufacturing Access Control Since 1985 Deleting a Site To delete an existing site from the Database Tree View window right click the desired site from the Sites branch and select Delete You can also select the desired site and press the keyboard Delete key Communicating with a Site In order to communicate with a site you must first successfully connect to the site go online To do so successfully the appropriate connections between the controllers and the Centaur Server computer must be completed Also the site s communication settings must be programmed appropriately as described in Site Communication Settings on page 27 The communication settings of each controller in the site must also be programmed appropriately as detailed in Configuring the Controller Communication Settings on page 57 Connecting to a Site or Disconnecting from a Site Perform the following to connect go online to a site or disconnect go offline from a site 1 From the Database Tree View window right click the desired site from the Sites branch and click Connect or Disconnect 2 Observe the communication status as
245. t E A A Slade ok doa A ach antes aude 3 Cental SEVA Golde ht dat idk bank tate nine eat bande ii di dicted deg ted 3 Centaur Administration Console Workstation n assess ttt eee 7 Setting Centaur as a Service Under Windows 0 0 0 nett eet 9 Plugging the Hardlock Key raisi pacai ia praia a bad ob dee weed eed Aa a A A deed awed peed bow tan beaut 10 Starting the Centaur Server and Software 0 ec tenet eee eee 11 Software Modules ji 002 6 cid Dd See bod bee eae E PX oe A onde Sea eee a Wee eae ea 13 Centaur is an advanced and powerful access control management software The following chapter contains important information concerning the installation and use of this software Manufacturing Access Control Since 1985 UY de Li REFERENCE MANUAL 42 1d Using Centaur Centaur Editions Centaur software is available in four editions Lite Edition With the lite edition you can e Create 1 site Connect through serial port RS 232 e Create up to 512 cards e Create 2 controllers e Create up to 16 doors Standard Edition With the standard edition you can e Create 64 sites e Connect to your site via TCP IP direct or dial up e Create up to 2048 cards per site e Create 16 controllers per site e Create up to 128 doors per site e Control up to 32 elevator carts Provide access to 64 floors per elevator cart e Create 128 floor groups Professional Edition This edition includes all featur
246. t a csv file containing card data into Centaur s card database For more information refer to Centaur Card Import Export Feature on page 102 Database Management Server only This feature allows you to control and manage the large and complex database files of the Centaur software You can back up and restore database files purge events from selected sites during specific periods limit the size of database files and delete entire database files For more information refer to Database Management on page 171 Database Backup Scheduler Server only Centaur s database backup scheduler enables you to schedule regular backups of the Centaur databases You can back up the Main database and the Event database separately specify the location of the backup files and select how often daily weekly or monthly the backup will occur For more information refer to Database Backup Scheduler on page 178 FrontGuard This module uses events generated in Centaur to retrieve a picture and or video feed to help you identify card holders or to view the location where an event has occurred For more information refer to Centaur s FrontGuard manual Locator Designed to function with the Global Anti Passback this allows you to monitor when card holders enter and exit designated doors in real time retrieve card holder information and print customizable card holder access reports For more information refer to Centaur s Locato
247. t may be required We recommend that you keep a log of when and what settings were changed Also refer to Typing Names and Notes on page 22 Output Settings Each controller includes six multi function outputs Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 6 outputs each Therefore each controller can monitor the state of up to 24 outputs Typically the controller s outputs are used to control the built in LEDs and buzzers of the card readers and keypads in the system You can individually program each output to follow a specific event as well as determine whether the output will be timed pulsed or latched Also refer to Overview of Output Programming on page 126 Determine how the six outputs will be used Typically they are set up as follows e Output 1 Access Granted for Door 1 green LED e Output 2 Access Denied for Door 1 red LED Output 3 Access Granted for Door 2 green LED e Output 4 Access Denied for Door 2 red LED Output 5 Beeper for Door 1 buzzer Output 6 Beeper for Door 2 buzzer Setting the Output Activation Events You can program the output to activate upon the occurrence of one or more selected events After setting the activation events for all required outputs you must determine which outputs can Output Properties Output Events be activated by each door see Assigning Outputs to a Door pei iS Pida on page 78
248. t occurs and it has been assigned a wav file as detailed below the associated sound will play The event that occurs will also appear in Centaur Wave player Real Time Events Status window until the alarm is acknowledged refer to Alarm Acknowledgement on page 137 for more information If the alarm event is not acknowledged the sound will replay every 1 to 60 minutes depending on the set value The wav file will only play if the selected event has been set as an alarm in Centaur The event s alarm acknowledgement feature must be enabled refer to Alarm Acknowledgement on page 137 for more information 1 Start Centaur Wave player as detailed in Starting Centaur AEII Wave Player General 2 From the main menu bar select File and click Settings Repeat sound every iE mins The Wave Player Settings window appears Event Definition 3 Inthe Repeat Sound Every text field type a value Pasa eee iy between 1 and 60 minutes This value applies to all events ana cia y eccess denied Card numb with an associated wav file Access denied Card stolen Access denied Door manu Access denied Interlock ac da A A denied Invalid acc 4 Inthe Event Definition list double click the event you wish Access denied Invalid loor H i H Access denied Passback v to assign a wav file to The Select Wav file path window li Access denied Schedule in appears Access denied Wrong floor Access denied two
249. taur can automatically save a xml log file of events to your hard drive This is convenient in the event i i 5 a i Log file options X that you require assistance from our technical support team and a log of recent events is required Log file limit 100 entries 1 From Centaur s main menu select the Options menu and select Log File EE Cancel 2 The Log file options window will appear Select the Enable Log check box This feature is disabled when the check box is cleared 3 Inthe Log file limit text field type a value in amount of entries from 10 to 1000 4 Click OK Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 4 2 Access Control Software s Access Control Systems Chapter 19 Manual Controls What Will Find Event Displays LA eid A EI gee ieee ti ba ee ace 164 Manual Controls Centaur includes an intuitive toolbar that you can use to display the status of specific output and input devices as well as control the activation and deactivation of those devices In each site you can view and control the status of the controllers doors inputs outputs and relays Manufacturing Access Control Since 1985 ee REFERENCE MANUAL Event Display The following sections describe how an operator can view some or all of the events in the system For details on how they are displayed refer to Events on page 133 Make sure you select the appropriate site from the desire
250. ted after the font selection The Default Font does not affect the fields that are already inserted to the badge template Flip Portrait Landscape Allows to switch the editor layout from portrait to landscape or vice versa e The View menu gives access to the following Toolbar Allows to show or hide the Toolbar Status Bar Allows to show or hide the Status Bar Show Hide Front Side Allows to show or hide the card badge front side Show Hide Back Side Allows to show or hide the card badge back side Tile Horizontally Allows to display the front side of the card badge on top of the back side Tile Vertically Allows to display the front side of the card badge beside the back side 1 Front Side and 2 Back Side Allows the selection of either the front side or the back for edition The Help menu gives access to About Centaur Badge Editor window Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 y Cards _ 5 Toolbar The Toolbar is divided in different categories as described in the following picture File Edit Sf 090 amTa a Card Settings CATEGORY BUTTON DESCRIPTION a MENU File Template Ctrl L File gt Template Allows selecting a template Save Ctrl S File gt Save El Allows saving the template Print File gt Print amp Allows printing the template layout Exit File gt Exit Allows to quit the Centaur Card Template
251. the flow control type required to communicate with the video switcher connected to the selected COM port Flow control determines the timing of signals and enables slower speed devices to communicate with higher speed devices There are various techniques but all are designed to ensure that the receiving station is able to accept the next block of data before the sending station sends it Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Sites a Activating and Configuring CMPP Card Enrolment Station The CMPP feature allows using a card enrolment station that reads a card badge and automatically shows the card number Hexadecimal Card Numbers on page 33 If a site requires CMPP you must activate CMPP to define the card type and through which COM port the CMPP commands will be sent and what communication settings the COM port will use Select the CMPP tab from the Site Properties window Site Properties sae Comms Cards CCTV CMPP Y amas CoP COM Pest Activating CMPP for a Site Bandas Dala B s Select the Activate CMPP check box to allow Centaur to use CMPP card enrolment station capability Selecting a Computer COM Port for CMPP From the COM Port drop down list select the computer COM port used to communicate the CMPP commands to the card enrolment unit Connect the card enrolment unit to the selected COM port The selected COM port will use the communication settings defined by the Bau
252. trol Output Status 131 169 Control Type Lock 73 Controller Addresses Dip Switches 53 Manufacturing Access Control Since 1985 Controller Configuration Wizard 50 Controller Properties Anti passback Tab 60 Configuration Tab 55 61 Controller Tab 52 Controller Reset 65 Controller Response Delay 59 Controller Status 65 167 Controller status 17 Controller Time Out 59 Controllers 49 Controlling Database Sizes 174 Crossover Periods 46 Custom CCTV Command 157 Custom Reader Format 63 Customizing Event Colours 167 D Database Backup Scheduler 13 18 153 178 Database File Management 153 Database Management 13 18 171 Database Management Module 172 Database Size 174 Database Tab Security Levels 150 Database Tree View Window 21 Databases description 172 Days Before End Date 94 DCOM Configuration for Windows 2000 Pro and Server 235 DCOM Configuration for Windows 2003 Server 206 DCOM Configuration for Windows XP 184 Deactivate a Relay Group 145 Deactivate Output 169 Deactivate Relays Manually 166 De energized Lock Control 73 De energized Relay State 173 Default Event Definition 134 Default Logon ID and Password 11 Default System Event Colours 167 Definable Card Fields 32 Defining Card Badge 98 Defining Holidays 41 Delay Controller Response 59 Delete A Card Centaur s Card Management feature 97 Delete Security Levels 150 Deleting Access Levels 86 Cards 95 CCTV Commands 157 Controllers 62 Doors 80 Groups 145
253. troller Time Automatically on page 32 Viewing Controller Status The View Controller Status command allows you to view the complete details of each controller The Centaur software will display the selected controller s site address status firmware version number of cards and errors that may have occurred and the controller s voltage status To view the controller status right click the desired controller from the Controllers and click View Controller Status Resetting the Controller To perform a controller reset right click a controller from the desired site s Controllers and click Reset Controller This will not affect any items you may have already programmed such as cards doors inputs etc If the DIP switch on the controller is set to default performing a controller reset will reset all programming such as cards doors and inputs to default Activating Deactivating the Controller To activate a controller right click a controller from the desired site s Controllers and click Activate Controller To deactivate a controller right click a controller from the desired site s Controllers and click Deactivate Controller Manufacturing Access Control Since 1985 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 7 Doors What Will Find Adding DOOS vii A ee a eee eee ed eg eee Pd a hs Wel ee es ee 68 Modityingr
254. trols S Manual Controls The following sections describe how an operator can view the status of the devices in the system and how they can remotely control these devices i e enable or disable a relay etc Make sure you select the appropriate site from the desired site branch in the Database Tree View window Appropriate operator permissions and security levels must be enabled see Operators on page 147 Displaying and Controlling the Status of a Door to manually change the status of a door right click the desired door You can also select multiple doors to manually change in the same way by clicking on the doors while holding down the Shift or Ctrl keys and right clicking on one of the selected doors A drop down list will appear Select one of the following actions from the list Also refer to Figure 35 on page 166 E When you click on the Door status icon Centaur will display the current live status of the doors in the system If you wish Lock Door Locks the selected door if it was unlocked on schedule manually or by a user Unlock Door Unlocks the selected door for the period specified by the door s Unlock Time see Setting the Door Timers on page 74 Unlock Door Timed Unlocks the selected door for a programmed period of time When you select this action the Activation Time window will appear In the text box type a value from 1 second to 9999 seconds and click OK Unlock Door Latched U
255. ts 3 Six of these events also have a latched check box If the latched check box is selected the output will ignore the Activation Time and instead will follow the event that activated it This means the output will deactivate when the event is restored 4 Inthe Activation time text field type a value from 0 to 999 seconds If an event is set to On or Flashing see step 2 and the event occurs the output will activate for the amount of time defined here unless the latched check box is selected 5 Selecting the Inverted check box will reverse the output s normal condition to ON Therefore when activated the output will turn OFF and when the output is deactivated the output will turn ON 6 Click OK Anti passback status If the Anti passback feature is enabled see Controller Anti passback Settings on page 60 and a controller registers two subsequent Entries or two subsequent Exits the appropriate Access Denied Anti passback violation event will be generated and the output will be activated Access granted The output can activate when access has been granted to the door following the presentation of a valid card or keypad code Access denied The output can be activated when access has been denied to the door following the presentation of an invalid card or keypad code REX granted The output can activate when a request for exit device vertical detector assigned to a door s REX input see Assigning a
256. ually setup each controller check box a Click Next b Set the available options c as required for each controller and click Next For more information on these options refer to Controller Configuration on page 55 To change the name of a controller double click on the name of the controller that you want to edit and type the new name Num Doors fields allow selecting the number of doors to be created for each controller Set the available options which includes Door name Reader Protocol Lock Ctrl and Unlock Time as required for each door For more information on these options refer to Door Settings on page 71 To change the name of a door double click on the name of the door that you want to edit and type the new name To change the Unlock Time double click on the value that need to be changed and Controller amp Door Setup Apply default settings to all controllers Individually setup each controller Please enter the number of Controllers you would like to add to the Site Number of Controllers 003 y Controller Default Settings Door Default Settings Unlock Time p 05 Sec Door Type IP Address 0 0 0 0 Port Number ficcor Input Config N C Inputs z Num Doors 002 y Custom Controller Setup Controller Name Address Active Input Config Num Doors Controller 001 001 WM Active N C 2 Controller 002 002 Active N C 2 Controller 003 0
257. uisites your computer may require when upgrading to the latest version of the Centaur software Deleting a Security Level Permission or Operator To delete a security level or permission right click the security level or permission you wish to delete and click Delete from the drop down list You can also select the desired security level or permission and press the keyboard Delete key A dialogue box appears requesting confirmation You cannot delete the default All and None security levels and permissions To delete an operator right click the desired operator from the Database Tree View window and click Delete from the drop down list You can also select the desired operator and press the keyboard Delete key A dialogue box appears requesting confirmation You cannot delete the default Administrator Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Access Conirol Software e 2 Access Control Systems Chapter 17 CCTV Commands What Will Find Adding a CGTV Command ym ii ic a arei ee ete eee A A ei e ere ee ee 156 Modifying CCTV Command s sic s ele cada teary atk as li a Gap ace pe Re Bopi iR Flare eo Hee AOR a eS eee a els 156 Deleting a CCTV Command 0 teeta 157 When you activate CCTV control Centaur can send a detailed CCTV command to a video switcher whenever an event assigned with that command occurs The CCTV command will tell the video switcher to switch to a specific camera and
258. up Globe Security Group Globe Security Group Globe User Security Group Dome Security Group Dome Security Group Globe User Security Group Dome Manufacturing Access Control Since 1985 2 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration In the Active Directory Users and Computers window double click on Users In the right panel right click on the new created group and choose Properties J File Action view Window Help e m x B2 m Bway 23 Active Directory Users and Computer H E Saved Queries Rp testz Builtin E Computers E Administrator Centaur i WA Move H Domain Controllers E Cert Publishe imail Security Gri E E ForeignSecurityPrincipals PBonsadmins BecurityGr Ey Users B OnsUpdatePr All Tasks gt Becurity Gri Domain Admit P Domain Comp Domain Conti Security Gri Security Gri Security Gri Cut Delete Domain Gues sis 2 Becurity Gri Domain Users Security Gri Enterprise Ac croup Policy Help E Guest Security Gri Security Gri User Manufacturing Access Control Since 1985 N REFERENCE MANUAL In the Members tab click on the Add button 2x General Members Member Of Managed By j Remove Ok Cancel amy In the Select Users Contacts Computers or Groups window type the domain s user name in the Enter the Object Names
259. up automatically detects and lists which prerequisites have and have not been installed on your computer To install the required software components click Next and follow the on screen instructions If all prerequisites are already installed the setup will skip this step go to the next step 8 When Setup has completed the installation of the Centaur software the InstallShield Wizard Complete window will appear Select if you wish to restart your computer now or later Click Finish Manufacturing Access Control Since 1985 4 2 1d Using Centaur Before you can use the Centaur software you must restart your computer An icon for the Administration Console is automatically added to your computer desktop The Centaur software manuals are automatically installed on your computer To locate a software manual click Start Programs gt CDV Americas gt Centaur gt Administration Console gt Manuals The Centaur hardware manuals must be manually installed on your computer To locate the hardware manuals on the CD open Windows Explorer Click on the appropriate drive indicator x from which the Centaur CD is inserted Double click the Manuals folder Double click the Hardware Manuals folder Copy and paste the manual s to the computer drive and folder of your choice A amp amp 4 In installations where remote workstations will access the Server through a network DCOM must be configured on the Centaur Server com
260. upports up to three 2 Door Expansion Modules CA A470 A which provide an additional 6 outputs each Therefore each controller can monitor the state of up to 24 outputs Typically the controller s outputs are used to control the built in LEDs and buzzers of the card readers and keypads in the system For example a red green indicator on the reader will inform the card holder that access has been granted changes from red to green or the reader buzzer will inform the card user that the door has been left open or the door has been forced open You can individually program each output to follow a specific event as well as determine whether the output will be timed pulsed or latched Manufacturing Access Control Since 1985 Overview of Output Programming Each controller includes six on board multi purpose outputs and each door can be assigned to activate one or more of these outputs Each controller also supports up to three 2 Door Expansion Modules CA A470 A which provide an additional 6 outputs each Gi Centaur All Events File View Options Modules Help IB ls WV A 9 9 Ab Man A amp Cards ce E Access Levels Holidays E Schedules a g Controllers amp Controller 001 EE Doors Figure 30 Overview of Output Programming Assign which output s can be activated by each door Door 001 01 Door 001 02 Inputs El bh Outp Door 001 01 Buzzer Door 001 01 Green LED Door 001 01 Red LED Door
261. urs When selected all lists become available Selecting the CCTV Control Schedule for an Event DK Cancel Apply Select the schedule from the Schedule drop down list which determines when Centaur can send the programmed CCTV command If the selected schedule is not valid when the event occurs Centaur does not send the associated CCTV command The Schedule list is only available if the Send ASCII Command check box is selected For more information on schedules see Schedules on page 43 Selecting the CCTV Command for an Event From the Command list select the CCTV command that you want to send to the connected video switcher whenever the selected event occurs The Command list is only available if the Send ASCII Command check box is selected For more information on how to program CCTV commands refer to CCTV Commands on page 155 Selecting the Video Switcher Protocol for an Event From the Protocol list select the protocol used by the video switcher connected to the computer s COM port refer to Site CCTV Port Settings on page 36 The Protocol list is only available if the Send ASCII Command check box is selected Manufacturing Access Control Since 1985 i REFERENCE MANUAL CENTAUR 4 2 Access Control Software e 2 Access Control Systems Chapter 15 Groups What Will Find What Are Groups vacio ii A A A AA E eee eee dd hl Ate sie in te ee ag ec ay 142 Adding AN GhOUDS ccs a cpec ees NA 142
262. us is changed Pending You can use this status level to create a card prior to the date the card becomes valid or for personnel on contract which would require a card to be active for a specific period of time When you select Pending from the Status drop down list the Start Date End Date Enable Card Traced and Days Before End Date options become available Use the Start Date and End Date drop down lists to select the day month and year the card becomes valid and the day month and year the card expires The card becomes active at 00 00 of the selected Start Date and expires at 24 00 of the selected End Date When the Enable Card Traced check box is selected a card traced event will be generated when the card is presented within the defined number of days Days Before End Date before the End Date Typing Additional Card Holder Details From the Card window select the User Defined Data tab and use these fields to record any additional information about the card holder For information on how to customize the titles of these fields refer to Defining CardHolder User Defined Data Photo the User Definable Card Fields on page 32 Hired On Wednesday January 20 2008 Birth Date Wednesday January 30 2008 y FF Full Time TF Day Shift Phone Number Title Note Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Card re Adding a Photo to the Card You can associate a picture of the card ho
263. uter branch Ensure that the Running Processes folder appears in the My Computer branch If it does not appear you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 208 if not go directly to Setting the Firewall on page 211 Component Services 8 File Action View Window Help E Computers E a My Computer En J Gy COM Applications EJEvent Viewer Local 1 DCOM Config Spservices Local Distributed Transaction Coordinator E Running Processes E Q Event Viewer Local E Services Local Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration Click the COM Applications branch The components of this branch will appear on the right of your screen If you get an error message and or cannot access this branch of components you must repair DCOM If your DCOM configuration is found corrupted then follow the steps in Reparing DCOM on page 208 if not go directly to Setting the Firewall on page 211 Component Services G Fle Acton vew Window Help ales xl es max aeo 8 E Console Root COM Applications 6 objectis Component Services as 2 3 i my Computer com QC NET Utilities COM gt ES Expbrer Dead Le m DCOM Config Distributed Transaction Coordinator 1 Running Processes i jal Event Viewer Local COM Utilties MS Software Syst
264. ve 2 If the auto run feature is enabled go to the step 3 Otherwise click Run from the Start menu type the appropriate drive indicator x followed by setup exe or click Browse to search for the setup exe file Click OK 3 The Centaur 4 2 Setup window will appear If this is a new installation of the Centaur software click Next and go to the next step To update previously installed Centaur software select Update click Next follow the on screen instructions and click Finish 4 The License Agreement window will appear To install the Centaur software select accept the terms of the license agreement and click Next 5 The Type of installation window will appear To install the Centaur Server select System management and communication with control panels Server and Workstation If you wish to select a different folder destination for the Centaur or MSDE software click the appropriate Browse button choose the folder destination and click OK Click Next The Administration Console is installed with the Centaur Server by default The Centaur software is installed by default to C Program Files CDV Americas Centaur The MSDE software is installed by default to C Program Files Microsoft SQL Server 6 The Selecting Languages window will appear The Centaur Server supports three languages English is automatically supported by default Select two other languages and click Next 7 The Centaur Pre Requisites window will appear Set
265. vel Permission or Operator To add a security level or a permission right click Permissions in the Database Tree View window or right click Security Levels from the desired Site branch in the Database Tree View window Select New Permission or New Security Level from the drop down list You can also select Permissions or Security Levels and press the keyboard Insert key To add an operator right click Operators in the Database Tree View window and select New Operator from the drop down list You can also select Operators and press the keyboard Insert key After adding a security level permission or operator the appropriate Properties window will appear see Modifying a Security Level Permission or Operator on page 149 allowing you to configure the selected item Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 y Operators a Modifying a Security Level Permission or Operator To modify a security level or permission right click the security level or permission you wish to modify and click Properties from the drop down list You can also select the security level or permission you wish to modify and press the keyboard Enter key You cannot modify the default All and None security levels and permissions To modify an operator right click the operator you wish to modify from the Database Tree View window and click Properties from the drop down list You can also select the desired operator and p
266. vent will be displayed in the Real Time Events Status window If the event occurs when the schedule is valid the event will appear in the Real Time Events Status window Disk From the Disk drop down list select the schedule that will define when the event will be logged in Centaur s databases If the event occurs when the schedule is valid the event will be saved Manufacturing Access Control Since 1985 y REFERENCE MANUAL Selecting a Device and Setting its Properties Under the Device Activation heading you can define a specific device such as a relay or output to activate or deactivate when the selected event occurs Also refer to the example on page 136 A Device activation will only function when the Centaur Server is running connected Device activation will NOT function if the Centaur Server is offline or if the selected devices are from a remote dial up site This warning applies to the Centaur Server only Whenever the Server comes online again events that occurred in the last 15 minutes will activate a device Events older than 15 minutes will be ignored upon connection Action From the Action drop down list located below the Device Activation heading select the type of device or group of devices that will be activated when the event occurs You can activate deactivate outputs or relays lock unlock doors and enable disable door groups Also refer to Groups on page 141 Timed If the device selected i
267. vices such as magnetic contacts motion detectors and temperature sensors Under Input Configuration select one of the three following input configuration radio buttons The selected input configuration applies to the controller s inputs and the inputs located on the controller s 2 Door Expansion Modules NC Inputs This setup will not support tamper and wire fault short circuit recognition but will generate an alarm condition when the state of the input is breached All inputs on the selected controller and its 2 Door Expansion Modules must be connected using the NC Input Connection Method described in NC Input Connection on page 116 ATZ 2R 16 Inputs This setup will not support wire fault short circuit recognition but will generate an alarm condition when the state of the input is breached This method also requires the connection of two devices to each controller s input for a total of 16 inputs The 2 Door Expansion Modules do not support input doubling All inputs on the selected controller and its 2 Door Expansion Modules must be connected using the ATZ 2R Input Connection Methods described in ATZ 2R Connection on page 117 ATZ 3R 16 Inputs This setup generates an alarm condition when the state of the input is breached An alarm condition is also generated when a wire fault short circuit occurs This method requires the connection of two devices to each controller s input for a total of 16 inputs The 2 Door Expa
268. w y me see Modifying a Relay ie Add Devices lay 001 06 lay 001 07 lay 001 08 lay 001 09 lay 001 10 Modifying a Relay OR lay 01 11 From the desired controller s branch in the Database Tree View window right click the relay you wish to modify and click Properties from the drop down list You can also select the desired relay and press the keyboard Enter key General Relay Properties From Relay Properties window select the Relay tab The Relay tab will allow you to view the component addresses as well as record the relay s name and any additional notes Viewing the Relay Address At the top of the Relay tab Centaur will display the relay s address as well as the address of the controller and site to which it is connected For details on relay addresses refer to Figure 22 on page 111 For details on controller addresses refer to Viewing the Controller Address on page 52 Manufacturing Access Control Since 1985 a REFERENCE MANUAL Figure 22 Relay Address Assignment for Each Controller El eee Relays 1 and 2 are found on the controller Relays 3 16 are found 8 CT V900 A Rela con Controller on the relay expansion modules Add 1 oe con A maximum of two relay expansion modules can Posy pa be connected to the controller RELAY EXPANSION MODULE 42 Relay Relay Relay Add 11 Add
269. will be followed by a Failed to Process Event event which will appear in the Real Time Events Status window At this point events will not be saved because the database has exceeded its maximum size You should perform a backup of the Event database see Backing Up Databases on page 173 and then truncate see Truncating Events on page 175 the database to reduce its size Perform the following to define the size of the Event database 1 After starting the Database Management Module as described in Starting the Database Management Module on page 172 the SoxDBase Centaur Database Utility window will appear 2 From this window select the Size tab and click the Size button 3 Inthe Restrict growth of Event database to text field type the maximum size of the Event database in MB or select the Unlimited Growth check box If using MSDE growth is limited to 2GB Do not select the Unlimited Growth check box unless the full version of SQL server is installed Do not enter more than 1800MB when using MSDE 4 Click OK Manufacturing Access Control Since 1985 Truncating Events When the Event database has reached its maximum size see Limiting the Event Database s Size on page 174 each subsequent event will be followed by a Failed to Process Event event which will appear in the Real Time Events Status window At this point events will not be saved because the database has exceeded its maximum size
270. xamples Advanced OK Cancel Click on the Check Names button to validate the group s name and click OK aixi Select this object ype Groups or Built in security principals Object Types Erom this location be Locas Enter the object names to select examples Distributed COM Users heck Names In Advanced OK Cancel Click on Start in Windows type dcomenfg and click OK Type the name of a program folder document or Internet resource and Windows will open it for you Open Cancel Browse Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 DCOM Configuration 2 From Console Root expand the Component Services Computers and My Computer Component Services Ele Action view Window Help 2 C Console Root age Component Services amp Computers i H a My Computer 1 Active Directory Users Q Event viewer Local COM DCOM Config Distributed Runnin Applications Transacti Process E Services Local 3 Inthe Default Protocols tab check if the Connection oriented TCP IP exists in the DCOM Protocols window if not add Manufacturing Access Control Since 1985 N REFERENCE MANUAL it clicking the Add button My Computer Properties 2 x General Options Default Properties Default Protocols MSDTC COM Security aga Remove Move Up Move Bown Properties Descri
271. xit Doors heading select one or more of the following check boxes Unlock Door 1 and 2 Unlock Door 3 and 4 Unlock Door 5 and 6 and Unlock Door 7 and 8 This feature is typically used when an entry and exit reader are set up on the same door and the door is using both a magnetic lock and an electromagnetic lock Enabling the Tracker LCD Display Option Each Tracker LCD is assigned to a specific door When this feature is disabled the Tracker LCD keypad will only display messages that occur on the assigned door Select the Tracker LCD Display Option When selected Tracker LCD keypad can be used to display the messages for both doors on the controller or 2 Door Expansion Module For example a Tracker LCD keypad assigned to door 1 will display messages occurring on doors 1 and 2 Door Expansion Module Configuration Select the Expander tab to program door and keypad configurations that will be used with the selected controller s 2 Door Expansion Modules CA A470 A A maximum of three 2 Door Expansion Modules can be used with each controller Controller Properties Controller Configuration Anti passback Expander Door expander 1 Reader 1 Standard 26 Bit y Keypad 1 None y Reader 2 Standard 2682 v Keypad2 None y Notice that when you click the Expander tab two Reader and two Keypad I Poll Door Expander Status Non Stop Front View drop down lists appear for each 2 Door Expansion Module Use these fields to configure the rea
272. xpansion Modules CA A470 A which provide an additional 6 outputs each Therefore each controller can support a maximum of 24 outputs Up to 6 outputs can be assigned to the selected door Typically these outputs are used to indicate whether a card is granted access and or the status of the door by activating and controlling the LEDs and buzzers normally found on the readers and keypads Depending on the selected door the Output Activation check boxes will be numbered differently Each group of doors is assigned specific output addresses as demonstrated below Outputs 1 to 6 belong to Doors 1 and 2 controller e Outputs 7 to 12 belong to Doors 3 and 4 CA A470 A DIP 1 off DIP 2 off e Outputs 13 to 18 belong to Doors 5 and 6 CA A470 A DIP 1 on DIP 2 off e Outputs 19 to 24 belong to Doors 7 and 8 CA A470 A DIP 1 off DIP 2 on The selected door and its selected outputs must be from the same controller or the same expansion module For example outputs 7 to 12 can only be used with doors 3 and 4 they cannot be used with doors 1 and 2 or 5 to 8 When a check mark is placed in the appropriate output check boxes under the Output Activation heading the selected output s will operate as defined by the output s programmed features refer to Outputs on page 125 Manufacturing Access Control Since 1985 REFERENCE MANUAL CENTAUR 4 2 Doors 22 Floor Public Access Schedule When using CA A480 Elevator Controllers re
273. y and text description of current live relay status Right click the desired relay s then select the desired actior Displaying Controller Status When you click on the Controller status icon from the menu bar Centaur will display the current live status of the D controllers in the selected site Figure 37 Display Controller Status Click the Controller Status icon Fie Wew Options Modules Help wwe e 8 Pod Kier owt aS oe uiBie 5 t Visual display and text description of current live controller status Right click the desired cont then select the desired acti Manufacturing Access Control Since 1985 REFERENCE MANUAL Displaying and Controlling the Status of an Input When you click on the Input Status icon from the menu bar Centaur will display the current live status of the inputs in the system If you wish to manually enable disable an input right click the desired input You can also select multiple inputs to manually enable disable in the same way by clicking on the inputs while holding down the keyboard Shift or Ctrl keys and right clicking on one of the selected inputs A drop down list will appear Select one of the two following actions from the list Also refer to Inputs on page 115 Enable Input When an operator manually bypasses disables an input this command will reinstate the active state of the selected input Disable Input Allows the operator to manually bypass t
274. y number is always the first part of the number and is usually followed by a colon e g 247 1234 If you cannot locate the family number you can present the card to any reader in the system and its family and card number will appear in the Card Holder field of the Real Time Events Status window see Figure 19 When you have located the correct number type it into the Family Number text box This text box will not be available if the maximum family number is set to 0 see Selecting the Cards Maximum Family Number on page 34 Manufacturing Access Control Since 1985 ee S A REFERENCE MANUAL Card Number and Card Number HEX The card number can be found printed directly on the card or written on a cross reference sheet The card number is always the second part of the number and is usually preceded by a colon e g 247 1234 If you cannot locate the card number you can present the card to any reader in the system and its family and card number will appear in the Card Holder field of the Real Time Events Status window see Figure 19 When you have located the correct number type it into the Card Number text box Alternatively enter the card number in hexadecimal in the Card Number Hex field when the Hexadecimal Card Numbers check box on page 33 is selected Entering the Card Number in decimal format will affect the Card Number HEX field and vice versa Figure 19 Using the Real Time Events Status window to
Download Pdf Manuals
Related Search
Related Contents
Uwatec DataTrak und Memo Mouse - Dive Samsung Galaxy Wave Lietotāja rokasgrāmata Operator Manual Martin® Spring Cable Tensioner FSH ELISA - DRG Diagnostics GmbH Owner`s Manual - Appliance Factory Parts Links - Olympus PIKA WARP the Appliance Hardware Manual Manuel d`atelier Copyright © All rights reserved.
Failed to retrieve file